Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe
Resource
win10-20231020-en
General
-
Target
9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe
-
Size
7.5MB
-
MD5
afac60d9771e0332b279b904832ea56f
-
SHA1
e55511f39838c2c8be5b0d7fd0adeb5fb9d65347
-
SHA256
9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739
-
SHA512
b7582644aa459f21cc0642a9d20604dc1ec2ea06448323ec32098c6f7f563f32a30be5a338f9958ceae13a3207d344069e984caadd121aff6bcc3fdb8060d7b4
-
SSDEEP
196608:gq/iLRC0OLkYNew6tjCtD2RQVsBp4UAzj:gHC9Lkuew6t2oCO9Azj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 4504 gifplayer.exe 4352 gifplayer.exe -
Loads dropped DLL 3 IoCs
pid Process 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\PlayGIF\uninstall\unins000.dat 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-C2SMJ.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-SQR6F.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-1148D.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-R9J5T.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-A5D2L.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-D5B78.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\uninstall\is-PPD22.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-M2BJC.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-KSHL8.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-U72OV.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-JBGQF.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-3TQOQ.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-2JU0R.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-085PG.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-4H4C1.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-05R0L.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-QT0O8.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-FGQ5B.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\plugins\internal\is-GNM5R.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-JV1T0.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-TC5KP.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-AV5J5.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\lessmsi\is-Q70TR.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-773L6.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-H51LL.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-858AD.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-2LBTR.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-3DTJ4.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-2DKST.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-H5CMB.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-100A8.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-B2H9P.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File opened for modification C:\Program Files (x86)\PlayGIF\uninstall\unins000.dat 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-A3UEP.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-ROCIF.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-8HHVF.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-L8FC5.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-8IMNQ.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-BGLK8.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-66C3F.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-LSCG5.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-VFUEM.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-7MF60.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\is-P3AUB.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-NFBTA.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-0M8DM.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-U3AST.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-5JKRP.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-S8JB3.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-0B7GG.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File opened for modification C:\Program Files (x86)\PlayGIF\gifplayer.exe 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-GMC24.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-9E9C2.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-VVI7T.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-SAVDE.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-VOADV.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-0LUQR.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-A29KH.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-HUHUL.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-3OGBJ.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-3KLQV.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\plugins\internal\is-TEIPJ.tmp 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2344 wrote to memory of 4600 2344 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe 71 PID 2344 wrote to memory of 4600 2344 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe 71 PID 2344 wrote to memory of 4600 2344 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe 71 PID 4600 wrote to memory of 428 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 72 PID 4600 wrote to memory of 428 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 72 PID 4600 wrote to memory of 428 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 72 PID 4600 wrote to memory of 4504 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 74 PID 4600 wrote to memory of 4504 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 74 PID 4600 wrote to memory of 4504 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 74 PID 4600 wrote to memory of 3208 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 75 PID 4600 wrote to memory of 3208 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 75 PID 4600 wrote to memory of 3208 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 75 PID 4600 wrote to memory of 4352 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 76 PID 4600 wrote to memory of 4352 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 76 PID 4600 wrote to memory of 4352 4600 9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp 76 PID 3208 wrote to memory of 5016 3208 net.exe 78 PID 3208 wrote to memory of 5016 3208 net.exe 78 PID 3208 wrote to memory of 5016 3208 net.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe"C:\Users\Admin\AppData\Local\Temp\9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\is-JU3QU.tmp\9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp"C:\Users\Admin\AppData\Local\Temp\is-JU3QU.tmp\9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp" /SL5="$A007A,7577497,68096,C:\Users\Admin\AppData\Local\Temp\9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:428
-
-
C:\Program Files (x86)\PlayGIF\gifplayer.exe"C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i3⤵
- Executes dropped EXE
PID:4504
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 114⤵PID:5016
-
-
-
C:\Program Files (x86)\PlayGIF\gifplayer.exe"C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s3⤵
- Executes dropped EXE
PID:4352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5da9488a20eb0c6f21ef404c0aa393210
SHA149d5c19e8a7735a25119e86691087a5700144cbf
SHA256c8f6a4e2688f73643a535731e7dc9079b8e0487a37c0c33db7eae6867ed63c91
SHA5129ffcb1d4d107b427a91c384b7e543036745a9319714df2dc2bc1ef07c3ee31d839b408cbff8681b7b7792b424a7a4788d647f6d9f7b78e0ef3221a79ba5e8f76
-
Filesize
1.6MB
MD5bcab7af59fd4a4c084c074275803816a
SHA1ffc5b504ddbb7299569ebddbc626ae061a7ed4dc
SHA256be107c08a975dfd019f96254342367006db18c642fe36cbea0e5d23690edb899
SHA512a322746d75e2212f05344722b74f8de2ebea412e7c19f6595684263974c9f47c23b8be9c42b114e21875325d60a03d702448e28d09680355a30d0de574f85b26
-
Filesize
846KB
MD526221c7afabd8903d9241f293a84345f
SHA10ffb844ab50f702b69aa2fea728caa1b17f6d4b4
SHA256e3d76bace01202e660fe2b94579d5f71cb2d7a0d2a098cdc3393a337a45b4216
SHA5121c7012094b793de57700d024891cd7b78ac19f00b1b46cbeb9a8e5d4d0c41f930bdeb9c509710ae93db75ef72b7787c1e8c406feeac9562f0556445d4f4c1c01
-
C:\Users\Admin\AppData\Local\Temp\is-JU3QU.tmp\9485d09b14a5096737b7d3d22f335d44ab1a4ed51537ce87fe30b034c83b1739.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303