Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
tuc5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
tuc5.exe
Resource
win10v2004-20231130-en
General
-
Target
tuc5.exe
-
Size
7.5MB
-
MD5
338541e642a4cf6f111296f49e5839e4
-
SHA1
5c61c2662070995fbf22ef25c0a623d7c90624af
-
SHA256
8a5e92a2abef83798bf150c49e4b3e34af2f9104c0cd0d4a2c382b9c9b8b43d6
-
SHA512
e167572a6f952af80ee7b3246cdc544fb54e6d1c12e4303c29591a51c61007fcbfc01af0c449ea9bed8372421ec99966ff25dcfa0725095c419a25e4e59961b1
-
SSDEEP
196608:hO78pimeIjZMmsj7bXzjl3iT1A9SG7ul2xdVNWiYmJE6RI6zj:E78pimNjMDzjl3dQAdVN1YyRPzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1876 tuc5.tmp 1968 gifplayer.exe 1356 gifplayer.exe -
Loads dropped DLL 6 IoCs
pid Process 2032 tuc5.exe 1876 tuc5.tmp 1876 tuc5.tmp 1876 tuc5.tmp 1876 tuc5.tmp 1876 tuc5.tmp -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.49.94.194 Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\PlayGIF\uninstall\unins000.dat tuc5.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-D14EC.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-VOUCJ.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-T8LUQ.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-016UA.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-38BR0.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-O8O06.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-V0GTL.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-E3G5T.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-HV2G6.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-Q4DDB.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-MJJIM.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-CIPEB.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-RM3I0.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-AH68M.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-QSKS6.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-91FN7.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-IV6QD.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-3ORFM.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-SHSBQ.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-NDGC7.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-HRR1A.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-NF339.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-3AM0K.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-NVFO0.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-F9JMH.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-BFBD1.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-0H9CG.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\uninstall\is-TL7DC.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-64A06.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-604J3.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-F0HGQ.tmp tuc5.tmp File opened for modification C:\Program Files (x86)\PlayGIF\gifplayer.exe tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-6RAHT.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-JLHI4.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-9TT8I.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-V5G45.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-0K79H.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-8SLA1.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-RG92P.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-LV5OO.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\plugins\internal\is-MF8TT.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-G7M0J.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-ELCHL.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-06A1L.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-GPVR9.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-9PJR2.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-I3DR1.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-R9S7D.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-3NEJ5.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-QQBLG.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-5L5HH.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-LG9RB.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-P1SLE.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-7Q5FK.tmp tuc5.tmp File opened for modification C:\Program Files (x86)\PlayGIF\uninstall\unins000.dat tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-EMIBE.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\plugins\internal\is-EH4FE.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-QLPEH.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\is-AO5JH.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-RQG7H.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\is-U9FVM.tmp tuc5.tmp File created C:\Program Files (x86)\PlayGIF\bin\x86\lessmsi\is-OG8M7.tmp tuc5.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 tuc5.tmp -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1876 2032 tuc5.exe 28 PID 2032 wrote to memory of 1876 2032 tuc5.exe 28 PID 2032 wrote to memory of 1876 2032 tuc5.exe 28 PID 2032 wrote to memory of 1876 2032 tuc5.exe 28 PID 2032 wrote to memory of 1876 2032 tuc5.exe 28 PID 2032 wrote to memory of 1876 2032 tuc5.exe 28 PID 2032 wrote to memory of 1876 2032 tuc5.exe 28 PID 1876 wrote to memory of 2548 1876 tuc5.tmp 29 PID 1876 wrote to memory of 2548 1876 tuc5.tmp 29 PID 1876 wrote to memory of 2548 1876 tuc5.tmp 29 PID 1876 wrote to memory of 2548 1876 tuc5.tmp 29 PID 1876 wrote to memory of 1968 1876 tuc5.tmp 31 PID 1876 wrote to memory of 1968 1876 tuc5.tmp 31 PID 1876 wrote to memory of 1968 1876 tuc5.tmp 31 PID 1876 wrote to memory of 1968 1876 tuc5.tmp 31 PID 1876 wrote to memory of 1964 1876 tuc5.tmp 35 PID 1876 wrote to memory of 1964 1876 tuc5.tmp 35 PID 1876 wrote to memory of 1964 1876 tuc5.tmp 35 PID 1876 wrote to memory of 1964 1876 tuc5.tmp 35 PID 1876 wrote to memory of 1356 1876 tuc5.tmp 33 PID 1876 wrote to memory of 1356 1876 tuc5.tmp 33 PID 1876 wrote to memory of 1356 1876 tuc5.tmp 33 PID 1876 wrote to memory of 1356 1876 tuc5.tmp 33 PID 1964 wrote to memory of 1524 1964 net.exe 34 PID 1964 wrote to memory of 1524 1964 net.exe 34 PID 1964 wrote to memory of 1524 1964 net.exe 34 PID 1964 wrote to memory of 1524 1964 net.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\tuc5.exe"C:\Users\Admin\AppData\Local\Temp\tuc5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\is-6C3HJ.tmp\tuc5.tmp"C:\Users\Admin\AppData\Local\Temp\is-6C3HJ.tmp\tuc5.tmp" /SL5="$50026,7611198,68096,C:\Users\Admin\AppData\Local\Temp\tuc5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2548
-
-
C:\Program Files (x86)\PlayGIF\gifplayer.exe"C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i3⤵
- Executes dropped EXE
PID:1968
-
-
C:\Program Files (x86)\PlayGIF\gifplayer.exe"C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s3⤵
- Executes dropped EXE
PID:1356
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:1964
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 111⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5208c3a3331104c8ed23a3569b9435aa1
SHA115f2d73415361d331c9d9e777efa401e8d7166f7
SHA256ef955c45c0d3fdd23aa6a7b4ee4f175e1e2b23b89b8e711a46d8df7d1b54d1c5
SHA512baa888c5cd90a5bd218ecfe69b5989243a8d0633b155f1696d2be3e25abcc6e96200b880f4d7d54cd02436556dfc2878dc5f882c0b5d740a4f25e737dfd71d8b
-
Filesize
60KB
MD5e666c9049892e413606b2dd0eca89734
SHA1f003f174f7978ae17fd236682e76c0f42ca1a1b2
SHA2568257f17221c914e9f53551e9f2cd72868bde7087cd7b6e752a623e03bb47929a
SHA5127f5307f14cadc563db7eb8496d40c030c80ad6244838b7d1687491297a5786e1a2936f66bde833ed3eb590e0b2a5f890296405e6436c255d531b7faba12d3aab
-
Filesize
71KB
MD5fc85beb4141968e21568ca379999e0bd
SHA18721419d133088c86ec5a521236f0e341f7797ee
SHA256f7270234c8c3315d627c12b9b84349d4bf24fd77dfb6f0dd98c6a632040ba9d0
SHA512b417de46a5c531c31f1b00a194597b0e0a968402a36bd038881b9cecdde0e64597f8672958fb250b1da90093f365481a26316ecf28a2e42c10ba5c5437ce023c
-
Filesize
1.4MB
MD529a06e80e4228721b6ff5e9096bcdd55
SHA1d859faa8a1a15f885ff6f0969b1cb2f297629923
SHA25695eed7cbea556fca64a8c28f775b96bfd3cab4e5c02928462616dd62b3d6c6f3
SHA512cc177dc78a85e410097977149c99a95c3d1f2dc465152466635e3302728025d76e7a1798136e2517122af0042a6b6adaec2527e5d3b51e607ca3f1458c3525c6
-
Filesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3