Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 04:48

General

  • Target

    8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.exe

  • Size

    6.9MB

  • MD5

    f42fb5d849e59572eb0256e4db4720ca

  • SHA1

    5e8add8387c8db2307df34bb19d70cef43b62e11

  • SHA256

    8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4

  • SHA512

    08fee3418d6646ec172164aeeaeb73d13ba7beedd72e736bd18b9e9df84c961f1a5b7c19acd6c94bb079236a4578116b6ca5880f141142bad2a7221d3513dba0

  • SSDEEP

    196608:dSnj/mmV+GsH+bNueuJRAZVAOk5Vvz+tqE9AmEkzj:dSjumV+jHUodIjk5VzfE9Awzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.exe
    "C:\Users\Admin\AppData\Local\Temp\8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\is-BA9NR.tmp\8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BA9NR.tmp\8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.tmp" /SL5="$801CE,6998999,54272,C:\Users\Admin\AppData\Local\Temp\8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2404
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
          3⤵
          • Executes dropped EXE
          PID:2224
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 10
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3512
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:540
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 10
      1⤵
        PID:1064

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        105KB

        MD5

        b83b99bee80e24f55b279857a342a6f0

        SHA1

        9108e6738b0c6acd83f0fcaec8d750aa8c5fc015

        SHA256

        a654a5dd22f63b9a6db4b759c496894cf6c303eada6af431eee02e1ba1c63d77

        SHA512

        d270fa8de19ea1d6cad7705a0e1616385cca0c33091262d5cf054245c9fb010d9c5db3f7ebb5b6168842e9830dfa51a3dc152fc69cef1bfad99c500b7ad394cc

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        139KB

        MD5

        7322cb182fc81a3d17f5862688422941

        SHA1

        ffd678193ffef526e64683b4b0434617e5e174d5

        SHA256

        4b6f3439331d05d18aafff78a7c687290979919605022b37759d598bc4f753f8

        SHA512

        0a20cca2b259c92095c2722d28acb845c8f5696366f3ad7eb1fa72b62256da66dfffaa3d96f91f786f12c3120b897d0755e081fb8ad6b147bfea40e266918a8a

      • C:\Program Files (x86)\CRTGame\crtgame.exe

        Filesize

        74KB

        MD5

        ab0e82add4f1d85389cf524b4e888433

        SHA1

        077ec40cbdec46538b4609dab20daceea3590bd8

        SHA256

        099264e60d0324812712e0a0cb9b064798601bd7869756367d69e0b3163679f3

        SHA512

        9a822598e49b23cd5c5e1bd0ec1cc5c6f10a8e1dac51993989b6b2255deb51cda9a70452c2fabcaa9993fa1283b1a8b26643b286b7c775357d10bdd3c2c6d6d7

      • C:\Users\Admin\AppData\Local\Temp\is-7V1V2.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-7V1V2.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-BA9NR.tmp\8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.tmp

        Filesize

        563KB

        MD5

        47607fa4e57555d90774d278429d51e9

        SHA1

        03fe73e951b5625285388f9c4c1bf1f0ef1022b0

        SHA256

        4253e6b1e4bf7245ea4e6d22e493388e6f0586273fa3f09043fe136a2ca2818d

        SHA512

        72deff7767f14e73eec8b4cf9fb65d62b9313504f0d07373f9ecc36c50d70e1825e47c4586d56349fa4bfebf0b273d7c03907fb995d086082e698e414a3b9b23

      • C:\Users\Admin\AppData\Local\Temp\is-BA9NR.tmp\8e76bacbd9c448646ae81e123b2cbbdcd2ca2cadfccc2cde53dcecd10a6eddc4.tmp

        Filesize

        671KB

        MD5

        92b3cb2b480dd0f96dc44a348c27024f

        SHA1

        4e331d0e0ac55c915df9b8f381c6d2432abb32af

        SHA256

        0ccb99c40b3d4cb12f7b440660c139d7949c610051a44e24233d7bf2eba86634

        SHA512

        bd9d3f8e26ed66e3a3bb945a13d7ebbc4bdb07f302554167a1deb25d82398d96b2fa38a6566ea8dd253e2298db495d70229df46d689c8b7fc2181b7c791f857a

      • memory/540-152-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/540-166-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/540-155-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/540-154-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/540-151-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2100-7-0x0000000000650000-0x0000000000651000-memory.dmp

        Filesize

        4KB

      • memory/2100-163-0x0000000000650000-0x0000000000651000-memory.dmp

        Filesize

        4KB

      • memory/2100-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/2224-162-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-184-0x00000000008D0000-0x0000000000971000-memory.dmp

        Filesize

        644KB

      • memory/2224-210-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-207-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-158-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-204-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-167-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-168-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-171-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-174-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-177-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-159-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-183-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-180-0x00000000008D0000-0x0000000000971000-memory.dmp

        Filesize

        644KB

      • memory/2224-187-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-190-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-191-0x00000000008D0000-0x0000000000971000-memory.dmp

        Filesize

        644KB

      • memory/2224-194-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-197-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-200-0x0000000000400000-0x000000000061B000-memory.dmp

        Filesize

        2.1MB

      • memory/3632-2-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3632-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3632-160-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB