Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 03:44

General

  • Target

    374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.exe

  • Size

    6.9MB

  • MD5

    3b17fa61d1cc51753802e43d935a4636

  • SHA1

    1ade8b682ddbf1a56c5a38602db5db32d95c28b1

  • SHA256

    374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e

  • SHA512

    1dfd1f64a57fb48d20df86d4da62196cfd81617511ef6317d788f125434b546607b55ecf24ca7413a556939019782f4a1f32e31d8253e67eba863bb34d8c247d

  • SSDEEP

    196608:zSnj/mmV+GsH+bNueuJRAZVAOk5Vvz+tqE9AmEkzj:zSjumV+jHUodIjk5VzfE9Awzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.exe
    "C:\Users\Admin\AppData\Local\Temp\374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Temp\is-CGHPS.tmp\374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-CGHPS.tmp\374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.tmp" /SL5="$5006C,6998999,54272,C:\Users\Admin\AppData\Local\Temp\374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4836
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:3412
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3924
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4472
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:544
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:2964

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              57KB

              MD5

              b6b20a6dbf0e1a97b60ee5ac2b9fb0d8

              SHA1

              b6aa4a651797a2c4ccf905869c2e556e12cb58b6

              SHA256

              4fafa5876d09ce0994b61a32841452a610fc86fb9c9e8c08f9d037695b73d78e

              SHA512

              ab043ed4927107e882bc10e61ec6f478fed08ee6e1e160d3ac7fab91351a02ea65ba58e6ca7b6e5942b680c76daa1e6e372972c1a59bd8189d3199d6db2592f8

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              124KB

              MD5

              9e0c3fab2b45f6d66542cd4d56d17b2e

              SHA1

              92690f5db96a74ac32801106e0fc70346952dff3

              SHA256

              71c5a2d274cdaeaf41571e683ff135d8cc936887e208ad22b8548efeeceaae8d

              SHA512

              256e23d8e250f2d3e3cc3629201f65f4362e982ec282043126e06a46e8cd9fc7458259f02397ed6a46811b1154c607c1e3ddb5ad5a6f75cc657fad167f7fc818

            • C:\Program Files (x86)\CRTGame\crtgame.exe

              Filesize

              92KB

              MD5

              a2dd92c0f8333ef036537291328bb275

              SHA1

              edcd83874306f3dc76e6eabe1993f7f0f10c1a5b

              SHA256

              f74f0969997697ef16ebd059150c57a1a77732f2b5b1ee7e4201330f920cffcb

              SHA512

              c4b50f86867e25faa3fc54d420d261ab7442ef57ca1b7036c6eeb8916c2079a1c072f44f85e2618dfec512c89da2c270be576d034f9617150ab45a1c5f155f7b

            • C:\Users\Admin\AppData\Local\Temp\is-A1618.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • C:\Users\Admin\AppData\Local\Temp\is-A1618.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • C:\Users\Admin\AppData\Local\Temp\is-CGHPS.tmp\374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.tmp

              Filesize

              106KB

              MD5

              f80c4c527ad746defd220a3668b5ceb4

              SHA1

              130052d7ed5142d729c622ef8cee26cdbbb090da

              SHA256

              72da4512472998fe6029809d77ac807eb2ff9f3dbbda13cdf25cec376e599f94

              SHA512

              61df01067dd7ef350d9eb5b7afbbfa6f1581b542aa39fd97524cb49643d76624b968925aff25185e3a68e432291fd75289e97e98df029f345db2cba04feb831c

            • C:\Users\Admin\AppData\Local\Temp\is-CGHPS.tmp\374d444c42ad5fece5c51efd4a760160cbf40caaa19201e56c91926ab03f205e.tmp

              Filesize

              129KB

              MD5

              cbc44cccc6b34fb6ca93d93263f58dd8

              SHA1

              3038178eb8ae6afeb4c84199576b8a7d69ea9dab

              SHA256

              233aaa7158b7850fb72646178af35560f525aeb037cb02db7ce2d00a4da412d6

              SHA512

              ea75fa11d01d8838a96b41f1b0eb3f343e040e219d22fc5e4f5c129e6082120e53055d651897e019ed4beb44fa3aed2387daa57ac72af6c6f42970d6fbed92d1

            • memory/2648-160-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2648-0-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2648-2-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/3412-202-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-166-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-158-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-205-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-193-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-199-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-209-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-162-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-196-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-159-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-167-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-170-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-173-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-176-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-179-0x0000000000760000-0x0000000000801000-memory.dmp

              Filesize

              644KB

            • memory/3412-183-0x0000000000760000-0x0000000000801000-memory.dmp

              Filesize

              644KB

            • memory/3412-180-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-186-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-189-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/3412-190-0x0000000000760000-0x0000000000801000-memory.dmp

              Filesize

              644KB

            • memory/4472-151-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4472-152-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4472-155-0x0000000000400000-0x000000000061B000-memory.dmp

              Filesize

              2.1MB

            • memory/4836-163-0x00000000020F0000-0x00000000020F1000-memory.dmp

              Filesize

              4KB

            • memory/4836-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/4836-7-0x00000000020F0000-0x00000000020F1000-memory.dmp

              Filesize

              4KB