Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 16:55

General

  • Target

    2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18.exe

  • Size

    7.5MB

  • MD5

    cebe0d139527dec56773a792488f03cc

  • SHA1

    ed6891f2a634de8d7484d8208bab8d9381f83832

  • SHA256

    2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18

  • SHA512

    aa2cb2eb69582f990e3e171e53edcd2204db304e2d123a93e1f6a6c9becbbb8f988d1bf5f9e5505274dae90ae1f603f13b604c34e428eae7a7d87c1177f3bab4

  • SSDEEP

    196608:4q/iLRC0OLkYNew6tjCtD2RQVsBp4UAzj:4HC9Lkuew6t2oCO9Azj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18.exe
    "C:\Users\Admin\AppData\Local\Temp\2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Users\Admin\AppData\Local\Temp\is-9K555.tmp\2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9K555.tmp\2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18.tmp" /SL5="$701F8,7577497,68096,C:\Users\Admin\AppData\Local\Temp\2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2548
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
          3⤵
          • Executes dropped EXE
          PID:2232
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4848
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5048
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:3020

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        283KB

        MD5

        875e29456c12e1c7fa9a12c1c9c787a5

        SHA1

        23e8b0de3ff71fd922aa922259e7932f758f0643

        SHA256

        f52f95b29098f87a9565db0b994c2ff58ac7a3476a7ce4e725bd5576ddf0bf87

        SHA512

        13cb3582a0e81dca388760fab2480c84f10dd6187404cb8a7f090607f0d545729aff0ab4f496d98b8da9368a0f459092642a8a829b433d88cd0990f78d25b3bb

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        354KB

        MD5

        53a1b8f29dd20fce2958d0774208f801

        SHA1

        cb2da2119caefd20fa36f2bfc9da44d55c219478

        SHA256

        b984a9857845d7caf03bb2dc043d6233a1c86dbf627e086a439ee729ec1355fb

        SHA512

        d1a567750e2a08dfa6a8c5b056a558ba0c96de07da74fba5ecc5495f676244d77eb289e4e54b065bf62a6bd5ca52d2d939cf75ab1dadc39b6822cd07f63862a9

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        192KB

        MD5

        f173352e8447ac6c36251c2e90b214df

        SHA1

        3be32f03402876c4d3eb578cd0a29ae1e031e1e8

        SHA256

        7a88e9614cd349b5e240510532b800f91e4cf240e5f99ce5a84e74364f9bfa90

        SHA512

        374f433851b53dc9ee97983bd34c036155a1c4666c1700e3c479c3a5024f72a0a744fef0314d656f0592bba7432923dd69aa2e9036df35e9fc2be6707a357b11

      • C:\Users\Admin\AppData\Local\Temp\is-9K555.tmp\2d77c1edbbba34d239a89249a64fadc1fc0d19a309413c62461ad9e9bcefab18.tmp

        Filesize

        687KB

        MD5

        f448d7f4b76e5c9c3a4eaff16a8b9b73

        SHA1

        31808f1ffa84c954376975b7cdb0007e6b762488

        SHA256

        7233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49

        SHA512

        f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4

      • \Users\Admin\AppData\Local\Temp\is-261RB.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-261RB.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/660-6-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/660-162-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/660-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/2232-150-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/2232-153-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/2232-151-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/3100-159-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3100-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4848-172-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-179-0x0000000000930000-0x00000000009CE000-memory.dmp

        Filesize

        632KB

      • memory/4848-158-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-165-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-166-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-169-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-157-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-175-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-178-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-161-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-184-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-187-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-190-0x0000000000930000-0x00000000009CE000-memory.dmp

        Filesize

        632KB

      • memory/4848-191-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-194-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-197-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-200-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-204-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4848-207-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB