Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-12-2023 16:42

General

  • Target

    ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.exe

  • Size

    7.5MB

  • MD5

    6c75073c1fd2480f20963e2f020a3c1b

  • SHA1

    04ed0239c8a2a127db52518eccdb43250a129af8

  • SHA256

    ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328

  • SHA512

    f2ea749f463f7ef6ba50930f90ff6f08c54ba8de41b15536cc900f4b42456dc5cf2bf52b2f6489987062a2d98a37ff8267d069d7fc657b74470bf93646318e5a

  • SSDEEP

    196608:3q/iLRC0OLkYNew6tjCtD2RQVsBp4UAzj:3HC9Lkuew6t2oCO9Azj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.exe
    "C:\Users\Admin\AppData\Local\Temp\ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\is-AFVH6.tmp\ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AFVH6.tmp\ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.tmp" /SL5="$80200,7577497,68096,C:\Users\Admin\AppData\Local\Temp\ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:196
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
        3⤵
        • Executes dropped EXE
        PID:924
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:380
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
        3⤵
        • Executes dropped EXE
        PID:1196
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4548
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:3488

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        29KB

        MD5

        66a6906edc5348e19171dfd50266ef07

        SHA1

        c6e8c30394ca9d30b9812cbaa6e4a36a34f7052d

        SHA256

        bdf9437ff1e5719ea1f54fe6139d3d1504524a1d67cc22940ca32f62c6d91a5d

        SHA512

        b7e3b5f06b2b6760bdd2d2e2690f1a59d7dca002ee66eec059d493775329d1dc6d1b13c748d24f982b791ca8a245a50e5320958a6bca33e699c41286d68b07ca

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        23KB

        MD5

        e7cc154ddfc171b91423537411b5f4fd

        SHA1

        489fcb3ad548c6e5fb394c6ada9a24f168b1fb3f

        SHA256

        ae01c116ce5c9123519bd605b2279ccc6713aeb8515a53b1019383c249f4946e

        SHA512

        31f8a906f4b71bb83e0c1a607b8559ca22ffab7b37b0fa04459440d4e52a25f1ab9ef3b0ba3634edf5e663d0d75ab4d8a532d6e538ac6a62ed6bea1ad8ea8daf

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        41KB

        MD5

        c1f5b669d778ee2592f654f66e1eec51

        SHA1

        84ac77a02beb9f1c626607aeb615d8d6d14390c3

        SHA256

        6f5646b81baece26033ee22a500d1e48353fc669ca4349eb39243e62c5c335c9

        SHA512

        bb7efb8d19d8809419be282640ae4f3a399c3b8ec3370e1c0d6a007fbd8e23f28191b42bc130e3322c1190a1582c8e772d552c0076c376df9e27a4ad9bfed3df

      • C:\Users\Admin\AppData\Local\Temp\is-AFVH6.tmp\ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.tmp

        Filesize

        92KB

        MD5

        e23c9ecf69cf8a0d5273f50a61d4c7f1

        SHA1

        add1a0b47b0dcd57fe397abba8a8375478868823

        SHA256

        a1e35c79dcc6d1f50638437e6a36c24a7580a2c293c21c5248cda2b72efc8e3b

        SHA512

        f858e2bef4ea1af4668df5698ddd11d75bde85ff57c24fe009152998fed3a62f47311ba772b1eae3862cb4f54a5f19603dacc75d9e145078dc5f6806608c0720

      • C:\Users\Admin\AppData\Local\Temp\is-AFVH6.tmp\ab194f21f649327a348a2f2fd1b944b059537b021feeaf84e9a8608a87888328.tmp

        Filesize

        193KB

        MD5

        02b79f97e15783ac491640d7da5164e2

        SHA1

        b7863858537a51d9d1e6933f9f4c8ed9b1bb96c2

        SHA256

        be7d86fe7940ce2e7a8fadd15a544ade65979c3623f376df74a6c2015671853f

        SHA512

        3a3572b985a7fd6004ce6c9175fa11b7a2cb505955b1c202a9c16f3c3a2047bb8511caadd598bffe894eca6a2f6652ae2e1a9f43e4a903321e7555d9ac918b36

      • \Users\Admin\AppData\Local\Temp\is-9OBP0.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-9OBP0.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/196-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/196-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/196-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/924-157-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-176-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-208-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-205-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-202-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-199-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-196-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-162-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-193-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-167-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-166-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-170-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-173-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-159-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-179-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-181-0x00000000007C0000-0x000000000085E000-memory.dmp

        Filesize

        632KB

      • memory/924-180-0x00000000007C0000-0x000000000085E000-memory.dmp

        Filesize

        632KB

      • memory/924-186-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-189-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/924-190-0x00000000007C0000-0x000000000085E000-memory.dmp

        Filesize

        632KB

      • memory/1196-155-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/1196-151-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/1196-152-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/2492-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2492-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2492-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB