Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2023 19:08

General

  • Target

    7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.exe

  • Size

    7.6MB

  • MD5

    37a6001b953d33f12eece7c161b15a39

  • SHA1

    ea42d809cc45e952551618aa41e6d8c185f0ac7f

  • SHA256

    7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878

  • SHA512

    fa2e09abe015d4aefcbe22aeea430164e61d002d60934421dd5beb796e538647a2e1a31d4414e24c9b985b82bf582476c1f8344f4681f5020b74753af62c8c82

  • SSDEEP

    196608:wnnY8NWvGpWTTlm0OxwW+nFnfZsMUdFt30Dzj:wnnY8NELTIrxwlxQWDzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.exe
    "C:\Users\Admin\AppData\Local\Temp\7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\is-NGR9A.tmp\7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-NGR9A.tmp\7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.tmp" /SL5="$B0028,7715663,68096,C:\Users\Admin\AppData\Local\Temp\7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:944
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
          3⤵
          • Executes dropped EXE
          PID:1272
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
          3⤵
          • Executes dropped EXE
          PID:1736
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3472
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:4900

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        958KB

        MD5

        18960736419a229631622d223c57352c

        SHA1

        e6015f7b3eeb8f5803778584dd9b157b33776b77

        SHA256

        47b48d20bc833b544c931c522a02930c1e8efb779cd553ff77494c2b0a5b273b

        SHA512

        eced2b4fd069291fe81cefd953c57d1f856c77a2fceed2e98923827523bdc46230316d6639f9b71f8b11e306a8cd67f2236864388ebfba5c6a4cbeea38d44428

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.3MB

        MD5

        db6695bbfd4c9ffa7055df7e9ffdca42

        SHA1

        389b88d5dfd477066552ada36ba21aa70a37d7db

        SHA256

        dfb097a226dd1e97946d3635c6c28ebeb9314ebe59107876de89130ed348ef8d

        SHA512

        6fb02442685d56e6c2f9b07f6e62153065a1ab588944ed1b250b4ef3d9b54a7eb2efd43229eca1fe120ac2f1127623c4c3f3ccd1671214da997bc87a5a55a91b

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        461KB

        MD5

        d55c7a7a105b9926c0b384126fa3bf50

        SHA1

        dc41785ab916363aedc43e1fe624f60b8f7949ce

        SHA256

        cfaf7f127985fb91d0c997d4c86c021f4be23da23a2cbda0bfa8d26440998d3a

        SHA512

        49a457e3ee9621babcbb4db3969e0d418983fdb3760e3875594a6aeac9eaf74f4e8ee5801b10615b524ba2ce722c2f6b72119d6cd8a981a6bbfde2335e5a4d00

      • C:\Users\Admin\AppData\Local\Temp\is-K5JGG.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-K5JGG.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-NGR9A.tmp\7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.tmp

        Filesize

        95KB

        MD5

        2e6e7af40aff14d82217dd2f84c17174

        SHA1

        193a30143f1fa7686fc4470638046c70fa5671b5

        SHA256

        cf31a0941467f8c2ac143a9af611e97e25ec654828a7a1bc179724e79b67c088

        SHA512

        b6f68dd9170b0b7063461ade5ff3e55d0930c7434298be1eda07e3b3dd4a35c3f7a0ec965f5fea2c60fd03179b0e01a2fc3014d57c7f366def315ab2ed90caa1

      • C:\Users\Admin\AppData\Local\Temp\is-NGR9A.tmp\7c94e210cf316979b56dfb7a9ec7205e437a3ff9af2ad1ec0904a6986495b878.tmp

        Filesize

        64KB

        MD5

        51c33e9596de92f526b0f54fc3f64a98

        SHA1

        ab1389f9a5dfa0b02f5fd7edcee29bf240ba8be6

        SHA256

        f9447f91e7bb104d0f37f1870a388fd7fe359f6b649f1a27fe767e9962fee345

        SHA512

        2ddd4a10853b53201445140d9e17ab0a2a35e0635a76c3cf8ce34dbc8ae7a59bc6ce2306f97a8c88e6dd5ec5da781315c133c363f6c728d5d53585f06df386a5

      • memory/1272-155-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1272-154-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1272-151-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1272-152-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-162-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-190-0x0000000000960000-0x00000000009FE000-memory.dmp

        Filesize

        632KB

      • memory/1736-157-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-208-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-159-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-205-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-202-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-199-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-196-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-166-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-167-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-170-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-173-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-176-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-179-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-180-0x0000000000960000-0x00000000009FE000-memory.dmp

        Filesize

        632KB

      • memory/1736-181-0x0000000000960000-0x00000000009FE000-memory.dmp

        Filesize

        632KB

      • memory/1736-186-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-189-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/1736-193-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/2960-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2960-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2960-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4888-8-0x0000000000630000-0x0000000000631000-memory.dmp

        Filesize

        4KB

      • memory/4888-163-0x0000000000630000-0x0000000000631000-memory.dmp

        Filesize

        4KB

      • memory/4888-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB