Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 03:27

General

  • Target

    65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.exe

  • Size

    6.9MB

  • MD5

    8cfafaa9f17a0cc869e8f0b6a14306e9

  • SHA1

    06107e4eba28b0844f1e00cdec1d67bd145b902b

  • SHA256

    65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70

  • SHA512

    6c393b52b8f5aa032a537cb3301581d43d5a3551693036a93d189528c6bd10c26a159561ca1fcbc00f77e970f8700efe058b9e4cabd873d21cdeada9d1c5ce04

  • SSDEEP

    196608:8Snj/mmV+GsH+bNueuJRAZVAOk5Vvz+tqE9AmEkzj:8SjumV+jHUodIjk5VzfE9Awzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.exe
    "C:\Users\Admin\AppData\Local\Temp\65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\is-5SSRS.tmp\65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5SSRS.tmp\65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.tmp" /SL5="$701EA,6998999,54272,C:\Users\Admin\AppData\Local\Temp\65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:3404
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:3596
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4896
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:3228
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:812

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              54KB

              MD5

              9792ea78e414952c124bb97cb9b61dad

              SHA1

              fc9fa226522ae41c222494135ac3b216792369d2

              SHA256

              83bec2178785178b70204035a543c656f430c6a18c301b040a51ec71942dbb9f

              SHA512

              0ccd2f1834d43013aa411e17237a477f16e4e67916b61c5c7f7eed7555d4f7960a2cdb8bb7547da147b040339ee166ebbcc0f90feeb21372a3c8092493417edf

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              46KB

              MD5

              29e55e121b74985b7ddb223a9ff78fb3

              SHA1

              0c672a73a66e24105e6df0e8a48aed5f5b0309c1

              SHA256

              d53a7f7d0a10ce9d59051f2bf08f560c686a9d4f830062329285e41dc613b9a6

              SHA512

              e790db332908ed5017648a94749a16714bce0ef892b88f9e55a4e8c952737d9fb7a2e597a46e5a3f824e2031bbaca23ae4765c5917c7226cddeb517aa8f4d287

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              113KB

              MD5

              c2ab3c37d85bb2b6a1f1c7ea7545b2a1

              SHA1

              92bd52af7c9dcf0be7758f1972754e1fb19c80bd

              SHA256

              e2219ca41d7170a8f51f9ba7c750da06a98028ffeb27ad13cf71b4f7afd89ebb

              SHA512

              0016b36f59cafdca94cf5715bea9f11a2ab9e0da2f8a59a1d912adac0e52ee287fad6a132092b3f195a20279044c07285192bb46bbe46a2a57c094bab7952be7

            • C:\Users\Admin\AppData\Local\Temp\is-5SSRS.tmp\65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.tmp

              Filesize

              43KB

              MD5

              69654b230c33d34edf879bdb372bca58

              SHA1

              6f32ca6d16cdecf5f5777ffa049725c49ab481a5

              SHA256

              75956484e8b85185a680a6a887da513fee73a705db4ecc06cd66d4119d4acfdf

              SHA512

              4548f6a6bfbf33f2fe6ea5001821a239f8b7704b910f7ea9a32d39040a6bd044955a7bb61d0cfd2935184a07750caea5bd3160abde40d519e685d991c1eab117

            • C:\Users\Admin\AppData\Local\Temp\is-5SSRS.tmp\65461f19bd585fdf72960d178ec8d4ea1583f05257eeb7ab796f5cf97693be70.tmp

              Filesize

              72KB

              MD5

              9554bcf60fa1e38903cc64d2474e1dca

              SHA1

              82bbe64059bb5f93d4533301a7d4ff433664b9a8

              SHA256

              e90eace9e7d475c5574e596891a966a557f1d26cafaa6074fa731e4b7304982e

              SHA512

              8311a034fb83e5c5772b7e48a2d11cf6c429dbfd54fdb9ec2fd04ff055509045500ee20763eb4277a9fe0fe438f7f3c84ead8969faab9d80524115ab2aff6102

            • \Users\Admin\AppData\Local\Temp\is-K78VF.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-K78VF.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/1444-2-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/1444-160-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/1444-0-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/3228-152-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3228-155-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3228-151-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3228-154-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-162-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-177-0x00000000008D0000-0x0000000000971000-memory.dmp

              Filesize

              644KB

            • memory/3596-209-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-159-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-206-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-203-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-166-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-167-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-170-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-173-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-176-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-157-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-182-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-183-0x00000000008D0000-0x0000000000971000-memory.dmp

              Filesize

              644KB

            • memory/3596-186-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-189-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-190-0x00000000008D0000-0x0000000000971000-memory.dmp

              Filesize

              644KB

            • memory/3596-193-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-196-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3596-199-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4740-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/4740-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/4740-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB