Analysis

  • max time kernel
    1s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 05:09

General

  • Target

    91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.exe

  • Size

    6.9MB

  • MD5

    e91e63ea95a985eb5720f0f65ccd38db

  • SHA1

    dfaa30b732b2831b305d05795a85a7e39429baef

  • SHA256

    91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9

  • SHA512

    925bf6573c5db5df49ac9c71570fc1e1ba5ff54f280e38c1134825e16ced7e126e8792514034780cb114796be43c3ab08b6ccd22160fb77673fd25b736bfdc01

  • SSDEEP

    196608:NA89BmaeXRdyXFnlUrU7o7Bz3HzNNn1jnNnTfMImG0zj:9BmakyVnlUQ7Wz3Tv1jNTh0zj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.exe
    "C:\Users\Admin\AppData\Local\Temp\91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\is-8S9E2.tmp\91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8S9E2.tmp\91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.tmp" /SL5="$A0064,6977575,54272,C:\Users\Admin\AppData\Local\Temp\91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1640
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:2040
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
          PID:4128
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:1288
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 helpmsg 10
        1⤵
          PID:2416

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          179KB

          MD5

          5183e579838397eff1d486f6e2cbc829

          SHA1

          762d3fea08fbec611f6e41537fe7cf37c28b943f

          SHA256

          abcd024d3e6b7d5699e1812d86f759fb00a01e256bdab3e3379cac5d875e7730

          SHA512

          2f5b1672718accba565bec879d0bf1306fa672eeb13b8235b818784879e1d2a085de49f33704b45db57734054c809e59ecbfe0eb320728e40e6b846298cf37ee

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          43KB

          MD5

          89416501c6e54631ed86d75ade5ea58c

          SHA1

          cddb9195f84d0c7d19a8fe743a4d7a8a3984c4a1

          SHA256

          f48b95832ff29ecde51ba8623da24e949fe5377ec9a39aae5b3f7ce0cefadd73

          SHA512

          6f4ac1f3c09b7cb2904a3396db523c0531d15eaf5e231d941a2f9fd414ebd384449f5c6cc03f9964367a7ade6eb249146ede3f280965d66e8c160dff5a979416

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          92KB

          MD5

          21caa044ceeacc7874bcfec162268312

          SHA1

          daa1dfdb1c599d2c1395426d64fcf6e65d6008be

          SHA256

          6d6389b3fda5d64eaaa8b383cd7e0cbb234c0a39c0aac44155a00c49525b8ec1

          SHA512

          f5617572a023ebc546f6567a91b2d3f25c36ca19fa3632714bc8a7e75a7862d13eb10f54bbf99657ae157375707bca6af87434cb396ec38fcc181f07973cbf80

        • C:\Users\Admin\AppData\Local\Temp\is-8S9E2.tmp\91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.tmp

          Filesize

          32KB

          MD5

          a7c7c3228521d81a1e863bb81daa149e

          SHA1

          f3b54d8d6c919fbebbb46195873e88624ead21fe

          SHA256

          3201deba453988ed530ba0061e18a0338d130bfbfe18720fadc549f96737cf8d

          SHA512

          094fdfc77b2dc2e419c9d000a4367eccc2a07a6b90c4d16024d831261443fdc229915320516eb5927173edb0aedd36a09d4a086310d29a1fac698e730f115b10

        • C:\Users\Admin\AppData\Local\Temp\is-8S9E2.tmp\91b0fe46f1948f02f86c4674ffcfb34836db231c7e67af53321b9f689bda3ea9.tmp

          Filesize

          25KB

          MD5

          c4b9f2e00f16de9b6ac1061da04d40ef

          SHA1

          65ca2994b6d400d974608da3f2f2c2944bf7203a

          SHA256

          44c6f4a8cf77ba03c3563bebf5dec8d47a99205ac6c8c2a4185f5fd43a6edd19

          SHA512

          9baf44e4d7cfdf760d9de468882835b4e69acb55ca10f964116a573b3f8b9eca66517aa18024e2e09f8bfa01f551f2410bd46736ebb00d035ad431954061419b

        • C:\Users\Admin\AppData\Local\Temp\is-NATPN.tmp\_isetup\_iscrypt.dll

          Filesize

          1KB

          MD5

          30f56d3dcdbb4cee25cac7637364c580

          SHA1

          99fb8bc836254b3d273fde24225fdecbfbf58253

          SHA256

          24925300046609e14788b5a383ecbf2b11eeb555bc8b2f99ed0729cf904e0128

          SHA512

          183246d537305beb844dc9e9b62f400f7a565b38f014cf31962c373be5fff892b48dfeb59a552a15b94dee7d687c2bedcc3e283194a9e4244183e7bca1a1f121

        • C:\Users\Admin\AppData\Local\Temp\is-NATPN.tmp\_isetup\_isdecmp.dll

          Filesize

          19KB

          MD5

          3adaa386b671c2df3bae5b39dc093008

          SHA1

          067cf95fbdb922d81db58432c46930f86d23dded

          SHA256

          71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

          SHA512

          bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

        • C:\Users\Admin\AppData\Local\Temp\is-NATPN.tmp\_isetup\_isdecmp.dll

          Filesize

          11KB

          MD5

          df5c8be6bcd94185a325c41c1a4f1825

          SHA1

          de4d7a5c2af0e52d9a10737bb2c7bb2a19877f4b

          SHA256

          ce577a9890ea322da1fbfca75fbece780be8f678f7a58836e5b8f4aebfe8e81e

          SHA512

          9ca7a137eca714cdf6d0dfbd286f8ee50fb8dcbc8c767a90492c15174149c09af2d9cde30f13f7429f5b8d18e02bc1e66109db2b9bbc3d96b4b063cec4d8f4dd

        • memory/1640-151-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/1640-152-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/1640-155-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-162-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-190-0x0000000000800000-0x00000000008A2000-memory.dmp

          Filesize

          648KB

        • memory/2040-159-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-209-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-206-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-203-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-199-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-196-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-193-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-165-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-167-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-170-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-173-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-176-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-180-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-183-0x0000000000800000-0x00000000008A2000-memory.dmp

          Filesize

          648KB

        • memory/2040-179-0x0000000000800000-0x00000000008A2000-memory.dmp

          Filesize

          648KB

        • memory/2040-186-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-189-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2040-158-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/3248-163-0x0000000000650000-0x0000000000651000-memory.dmp

          Filesize

          4KB

        • memory/3248-161-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/3248-10-0x0000000000650000-0x0000000000651000-memory.dmp

          Filesize

          4KB

        • memory/3828-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3828-160-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3828-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB