Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 04:24

General

  • Target

    2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.exe

  • Size

    6.9MB

  • MD5

    71bbf421e85dc8e74a54777d30b6dbe2

  • SHA1

    5cd3e0f1b7e0f20a1b01a3779937bb4ce2e579ca

  • SHA256

    2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e

  • SHA512

    6f0f0c1d32362c2e4601369f2133aa65d35db70f8d07e6b776c1269be007679eabcf5d0ff3b9b9592a547bfda4ecff06aad5ab21ca2c06aca307da429d10e819

  • SSDEEP

    196608:KK2+nNevvWstwr2m5BmycyEbSfasepd5e4x6+AjZ6mjxzj:KDY6tiP3myRfzepXe4ny8gxzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.exe
    "C:\Users\Admin\AppData\Local\Temp\2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Users\Admin\AppData\Local\Temp\is-8N32P.tmp\2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8N32P.tmp\2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.tmp" /SL5="$70202,6991381,54272,C:\Users\Admin\AppData\Local\Temp\2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4888
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4912
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3776
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2540
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:1708

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              283KB

              MD5

              27148ef819afb93ae1c0a41057e606e6

              SHA1

              929b0e15ca49e8d78e1b9a6477aabce470b63d1b

              SHA256

              706eb39436b85573325b4b57966afc358b7ab4bde82399af935c603df161ee7c

              SHA512

              722b4422b03f50b4dc2490d5f4c1db68256081d73bcd93d6f5a3e65ce20d59571010a3d5099aba6a67598b03a986adb200d84dd329cad1aba2536cc0bd0cac00

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              120KB

              MD5

              a49cb54b44052875e992fd1a90755c0c

              SHA1

              4353e1d8e0c571b520e206982805b6ce1bbb7efb

              SHA256

              d19f96a97284d6fbae483bcf07aa60dffdd5b727549d2208b9fe251c454a277e

              SHA512

              10bdca159185261464c664bbe8a84351371c8a9e346a5d57b14ae627973c74af48e3d3b3091d5fbded96795f46f77a4c3c46f60733cb62ef07b53d8d85336e6c

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              242KB

              MD5

              7953ad5e4a5144c7954d4b6ae491dd45

              SHA1

              db2813f8ce902e6f98e7a9179b796101d3786dd2

              SHA256

              33eb1e0d2dc3f69341e02d3504c8336a6e757f85d0e159a646eae7306fda3b7d

              SHA512

              b3f7bd7f0cf10d531767fbec6935ca888610bae74419d2093942bc0893ae282adacf04ca72b2462f47544b32a7436ce4abce42487a060b65b3cb7c50f576744b

            • C:\Users\Admin\AppData\Local\Temp\is-8N32P.tmp\2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.tmp

              Filesize

              44KB

              MD5

              c9c4bcff311fd543000c6d5b926b8e4d

              SHA1

              3afef59caa80337f6c463811948786ed53393754

              SHA256

              24143515df7687fe03caf95e3d2bd87905fcd6bbc7ffa52cf8775a6b53a09eae

              SHA512

              3f5efba80c18483d05f9fe3043e302dc974bf1e3dcf1f35fed2ce24ca8d38672f78a32bc7941663daec6e1810ded5f1da26ecf0f02dd13405876f65da83e34c6

            • C:\Users\Admin\AppData\Local\Temp\is-8N32P.tmp\2d86ffec57a165a8fb4734a16563ceedee3c27ccffbb7f67db350bad5625d58e.tmp

              Filesize

              5KB

              MD5

              f08aff91a13091a6a32547a31d3ba1ac

              SHA1

              88513644835e2a1932d2e6ffc3584b81126bdecc

              SHA256

              be318b522f639a92fa1622800732094a2038b614b61af2ef0ede93d451d6759d

              SHA512

              4365b60e3afbe6bb6ca0f63b8230ced7485a56d46a4eb9ccda8c152943bd7bf49da4e438fa21bac69a27f716b30f247dabdb76ca3c5b7286e61b678d3889e287

            • \Users\Admin\AppData\Local\Temp\is-N1F6C.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • memory/1436-159-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/1436-0-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/1436-2-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/1484-12-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/1484-162-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/1484-160-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/4888-151-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4888-152-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4888-155-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-161-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-182-0x0000000000850000-0x00000000008F2000-memory.dmp

              Filesize

              648KB

            • memory/4912-165-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-166-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-169-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-172-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-175-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-176-0x0000000000850000-0x00000000008F2000-memory.dmp

              Filesize

              648KB

            • memory/4912-181-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-158-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-185-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-188-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-189-0x0000000000850000-0x00000000008F2000-memory.dmp

              Filesize

              648KB

            • memory/4912-192-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-195-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-198-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-201-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-205-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB

            • memory/4912-208-0x0000000000400000-0x000000000061C000-memory.dmp

              Filesize

              2.1MB