Analysis

  • max time kernel
    1s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-12-2023 05:17

General

  • Target

    3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.exe

  • Size

    6.9MB

  • MD5

    563877b853982673509a57905c488637

  • SHA1

    bc6e7ab01bb9f412d1179e954281a3505cce268b

  • SHA256

    3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520

  • SHA512

    a9c37fced0c5531a5dc72023113c7e356e90b8925cba45127df8cd205bd527b47cb63bbd6e30af51bf097f01d3dabb03bbfde6cb059f8adf8c5ec92a97a878cc

  • SSDEEP

    196608:7A89BmaeXRdyXFnlUrU7o7Bz3HzNNn1jnNnTfMImG0zj:fBmakyVnlUQ7Wz3Tv1jNTh0zj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.exe
    "C:\Users\Admin\AppData\Local\Temp\3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\is-A9NA3.tmp\3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-A9NA3.tmp\3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.tmp" /SL5="$50234,6977575,54272,C:\Users\Admin\AppData\Local\Temp\3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Program Files (x86)\CRTGame\crtgame.exe
        "C:\Program Files (x86)\CRTGame\crtgame.exe" -s
        3⤵
        • Executes dropped EXE
        PID:2464
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 10
        3⤵
          PID:4144
        • C:\Program Files (x86)\CRTGame\crtgame.exe
          "C:\Program Files (x86)\CRTGame\crtgame.exe" -i
          3⤵
          • Executes dropped EXE
          PID:2872
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:2740
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 helpmsg 10
        1⤵
          PID:4824

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          4KB

          MD5

          375204c331e14f00132c3f015177702d

          SHA1

          a38259d23d04e5016f05b849f003cac5052208b6

          SHA256

          2aa9dbf4895a690ba4cc3b0ac9a63829889a9a807110c83214838f03c24a0fc8

          SHA512

          e69583f22e5f1493fe3cc24b417a54b7998ee462a0345dd9af052f670a2b86a9eea126ce8965d30c6a083bb69b60032212ac0ae9275a2c4d3c967fa2d14f4ef6

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          68KB

          MD5

          f1d2a76c2116784db2b0f0957e38383e

          SHA1

          1da6ce35e65b585e70c36bf408f75dc89dba8a83

          SHA256

          d924d09f44a3ade6612830cabfa61ce13dcb0f3c82c8184f8afd0d61337800c2

          SHA512

          d6d959ee05a9459e7e737ac6a2594b66081dd885adf1cad5bb1ad67097c3133625c663674dc80ef34e9bdb7c711fb8c62dfed736c7414aed893ae255460f3d9f

        • C:\Program Files (x86)\CRTGame\crtgame.exe

          Filesize

          68KB

          MD5

          34706e605f75c143402aba9714f3de95

          SHA1

          3807d14f5bf552caeb8d1513373647f29ed4ac6f

          SHA256

          faa1742ed8280aae243fd3613b9490b741464378b6cb28d4698fa1aba2802a20

          SHA512

          7648719cb27149f58c7ba50f24b07539f14a7dfb3b8383de1f8fc527035cc57d9fd711f562e9366f5e2ad255b1a16823e0b30a30fe30f0bb489aac647182f76f

        • C:\Users\Admin\AppData\Local\Temp\is-A9NA3.tmp\3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.tmp

          Filesize

          10KB

          MD5

          363ae8a96b6d085fb90ee20c19fdbf87

          SHA1

          16ff9e6580dd91112a844c715cf81e3bdc0965b1

          SHA256

          1e1cfe00bd0625f820bdd320d54e43fd73feaf367d29bc474fc1b2554bbfa1f8

          SHA512

          e2ec8ac817ab9d8b916cc30d43ed1f87c2fa326db6eb9c55c3b5e51d8416e52569d9a78234b3cbcdc1475ab96fda5bf44f422a5f6a95ed4f07da5c61dd518b75

        • C:\Users\Admin\AppData\Local\Temp\is-A9NA3.tmp\3edbad3cc6190ba00ae856a19c5056cd7e8a9ecfea43c577460d7692d643b520.tmp

          Filesize

          14KB

          MD5

          93696f186d7b238576176b53e3e370a3

          SHA1

          16811c67049d193ee79af62940f4212fcbbe5f93

          SHA256

          f95b6698e03b248b40cb2e7e2d99a1e607f12cff3f653ab93cbacf7e1f0b0cae

          SHA512

          0191b323df9cbcdf306753c7ec22b2e81344c320dbaa9eef2f0f70aabce79b78ecdcb1699caff91b3b94772cd8d925067cd53ae841a14c578f69f6c46e4cf97d

        • \Users\Admin\AppData\Local\Temp\is-OK3DM.tmp\_isetup\_iscrypt.dll

          Filesize

          2KB

          MD5

          a69559718ab506675e907fe49deb71e9

          SHA1

          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

          SHA256

          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

          SHA512

          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

        • \Users\Admin\AppData\Local\Temp\is-OK3DM.tmp\_isetup\_isdecmp.dll

          Filesize

          19KB

          MD5

          3adaa386b671c2df3bae5b39dc093008

          SHA1

          067cf95fbdb922d81db58432c46930f86d23dded

          SHA256

          71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

          SHA512

          bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

        • memory/2464-182-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-189-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-209-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-159-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-157-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-206-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-203-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-199-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-196-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-193-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-190-0x00000000008C0000-0x0000000000962000-memory.dmp

          Filesize

          648KB

        • memory/2464-162-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-186-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-167-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-166-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-170-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-173-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-176-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2464-177-0x00000000008C0000-0x0000000000962000-memory.dmp

          Filesize

          648KB

        • memory/2464-183-0x00000000008C0000-0x0000000000962000-memory.dmp

          Filesize

          648KB

        • memory/2872-152-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2872-151-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2872-154-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/2872-155-0x0000000000400000-0x000000000061E000-memory.dmp

          Filesize

          2.1MB

        • memory/4448-10-0x00000000001F0000-0x00000000001F1000-memory.dmp

          Filesize

          4KB

        • memory/4448-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

          Filesize

          4KB

        • memory/4448-161-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/4452-160-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4452-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4452-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB