Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-12-2023 18:32

General

  • Target

    4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.exe

  • Size

    7.5MB

  • MD5

    24727775c6f89d3d298a143e4be65792

  • SHA1

    ca7f3c9e2de963174d9058d87395f24b47ebc021

  • SHA256

    4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092

  • SHA512

    2f1653496d4ce80991f1577104f14189640cbded9e88eef1de749eb9a2f2b4eae47aa9f264c47332ea6b83c689e051c61901168a37fd0249ff35c3dd439a8d95

  • SSDEEP

    196608:0Wc5A2XV/1qTZGgnkphp0rAwZYGespRHDfY5cdV4qCzj:IDFyOTpBsLp1c5SV4qCzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.exe
    "C:\Users\Admin\AppData\Local\Temp\4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Users\Admin\AppData\Local\Temp\is-HBBNA.tmp\4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-HBBNA.tmp\4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.tmp" /SL5="$70204,7612629,68096,C:\Users\Admin\AppData\Local\Temp\4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4376
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
          3⤵
          • Executes dropped EXE
          PID:1708
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:220
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:2948
          • C:\Program Files (x86)\PlayGIF\gifplayer.exe
            "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
            3⤵
            • Executes dropped EXE
            PID:520

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        958KB

        MD5

        2106823df480083e66040def8679ded4

        SHA1

        1578e001242b9bac35d465ec0a53816c693c771a

        SHA256

        90072c30fc06ee2d28fb8ee790883c36bd1c74688b1f1b5212e67f1c6395c488

        SHA512

        881acb5fbe5fd0f128752597591f4bc8e796a875ccceaa1b05643401b7cb462dd6d728e2c46e6369625e9f3b18286a307cf34a9625996946b5c9aeb66948f387

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.4MB

        MD5

        721d35a02f17be13ef04980b2692816d

        SHA1

        a80551b85a46a527c739084a77385f0061687d6e

        SHA256

        de1406019fcc3a679f39dad198dabb16ed426ffed2962ab8e9b6c22a8d8cdee2

        SHA512

        dbcaf31ad25ae8b6fb7551140401b7ea0945dfa5c013dd7f423eb08f1df503bf888cca7e7ccb5ef457c9da3565d79b1437c4f2c4b03499658907e72131977408

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        506KB

        MD5

        b7fcf308c36cce22db96b7e4254a2a44

        SHA1

        b48c12180f2f6379100506434463da9428578985

        SHA256

        8aa7b819453d44f6d1baf641dc357df0e30e67683d4da44ddf4243720dad3665

        SHA512

        50e18a0992deb24fe5802e0b9b2021ba2379791edf71317fad44892546fc93cd983972fc75a40c331e554765fc3124c3ed61cd8b971b23c44bf77642bf8003ed

      • C:\Users\Admin\AppData\Local\Temp\is-HBBNA.tmp\4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.tmp

        Filesize

        531KB

        MD5

        a1ae0694572c5daa9ab79c5ce4ea959d

        SHA1

        c0ed1128c2383063d280d38817461edc9a92249e

        SHA256

        f48aa14797fda158b55a28f2f29083093648d0fdf27953d7a97bedde4c1332b0

        SHA512

        6abec5efaaa0dad7d92e79418cc6da7e3744a638611ab87f2448c837c844b16c1947b47d4ef504e8267d2f12946f057b351ca4da8ff6a17ca503ca9b6ae7f879

      • C:\Users\Admin\AppData\Local\Temp\is-HBBNA.tmp\4070784e8d91f91b27248e96b245d26ba9f7db0a8469c30baaaddef272908092.tmp

        Filesize

        442KB

        MD5

        c6fd3dd5f7dbbf835213e4c218bc4a76

        SHA1

        4d94601ec713d84c87336b9cc2493045065ede93

        SHA256

        63f5cfcbba4c0404a9e81d37a390a67355b4058389f5e565fa8013bd09ae2f4c

        SHA512

        4a28d1e9a446393c31c53af55d3256c1295e05532eec26dc8ccb39082eceaa2cd70d9c06f035e089feb884560c8d83296970fa28442522dc00aafbcf43027c66

      • \Users\Admin\AppData\Local\Temp\is-VLNQT.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-VLNQT.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/520-183-0x0000000000940000-0x00000000009DE000-memory.dmp

        Filesize

        632KB

      • memory/520-170-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-208-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-205-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-202-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-199-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-196-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-158-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-159-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-193-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-190-0x0000000000940000-0x00000000009DE000-memory.dmp

        Filesize

        632KB

      • memory/520-162-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-189-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-166-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-167-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-186-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-173-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-176-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-179-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/520-180-0x0000000000940000-0x00000000009DE000-memory.dmp

        Filesize

        632KB

      • memory/1708-155-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/1708-154-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/1708-152-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/1708-151-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/3608-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3608-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3608-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4868-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4868-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4868-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB