Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 20:02

General

  • Target

    11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.exe

  • Size

    7.6MB

  • MD5

    f6d91bf7ed73bf89fdd6fffe0c8f4c30

  • SHA1

    8f5f82b95bdef68114a48596968a883202fc8804

  • SHA256

    11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab

  • SHA512

    d43a03226c3a6bc538ef9f05ebc92fd742fe67eceab1fc17289cea9210ced16343193d43ccb48f8f5e0ae7b959e55698571fdc998369d7e481d65cc7d8f15db9

  • SSDEEP

    196608:KnnY8NWvGpWTTlm0OxwW+nFnfZsMUdFt30Dzj:KnnY8NELTIrxwlxQWDzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.exe
    "C:\Users\Admin\AppData\Local\Temp\11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\is-O35QL.tmp\11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-O35QL.tmp\11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.tmp" /SL5="$501F0,7715663,68096,C:\Users\Admin\AppData\Local\Temp\11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
        3⤵
        • Executes dropped EXE
        PID:2324
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
        3⤵
        • Executes dropped EXE
        PID:3156
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3612
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:320
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:2404

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\PlayGIF\gifplayer.exe

              Filesize

              367KB

              MD5

              6000fc66bb7ac651025e21635abfdd18

              SHA1

              9a03e06ad5c27eadfb72197ec80237e88200cb45

              SHA256

              9471f04dc4ce9b2093aeca209d1efc27cdb6652374975971799ab8030f7fa3d0

              SHA512

              77ddc1ba056425b3cbfc664f841d66122c11e00a9ca117b8a18d687dd2f9218b57d36ff2840ecea99ddc8b2e941302e69ccab3428f5b1b2814aa111ab7da97a5

            • C:\Program Files (x86)\PlayGIF\gifplayer.exe

              Filesize

              1KB

              MD5

              007e408b73ccddc5fa88c206d4795f2c

              SHA1

              4ce7eb998f96896f124abbe2ceddc51daf265e44

              SHA256

              186597fbfbff4e1435497c95a0f04994a5a841def35968628cee23f121f127ba

              SHA512

              2ffdb162a497a87751460a149a1f7893fea4a155fbbb92338f159451e9262b797a5eca4b09e677fd4612947b801e8b7bf02a40f268b76663851c9f6e46c16d4c

            • C:\Program Files (x86)\PlayGIF\gifplayer.exe

              Filesize

              359KB

              MD5

              abe5c2e2b5a52b3bf18a0a5856e0b740

              SHA1

              9500e9e6e5c239d05b84e668600731788b693d7a

              SHA256

              dc16ecd44e09e51738044666c7dc1ad059299508bbe9cb0e1a86bb22a3c85227

              SHA512

              194ddfed7176747a60fffec4706c23d9c2c05bfdc01c38771a2aaee56d54876359a74a3995774c3445001e2a74e63b5461e241e929bfb8731e97aef002e1f29a

            • C:\Users\Admin\AppData\Local\Temp\is-O35QL.tmp\11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.tmp

              Filesize

              468KB

              MD5

              ea14bcd5d87c220b640b0cd9ead4f5de

              SHA1

              8acbd29ef7470eb257d6d56a591ed900d8738470

              SHA256

              52750e32baa2e33749f9dd9e4273ba8235f9f1a023cc348b9c0d0a3d49cd1cbd

              SHA512

              ea73512fa3a863c282b0ff524bfd2b7891cb0859c9210f7a7136affff080c8106ee258a911af22825316024793280dc86a835b349b6905c1855bdc04c3f62492

            • C:\Users\Admin\AppData\Local\Temp\is-O35QL.tmp\11c00639d6f13c6eb409bd2de7f6ecf562e75580646dd11189417faa3500bcab.tmp

              Filesize

              205KB

              MD5

              dc2ff38b6c8921d5abd5459eade5e81c

              SHA1

              9b5c7aebebb937d7f10beff0379eeaf54d2a2d6a

              SHA256

              174a92998ceb417ca7e1305196bb4eb6a73b560d21f0a450ba3e050fe6c42060

              SHA512

              105ef4858b523d5fbf05fcfb03daa1b58353d8e0b0108bd876ecd7d3811327152232748b833c61549987106a5cdb2d903b7c8cb413f567af8eb00ecead9c1eda

            • \Users\Admin\AppData\Local\Temp\is-MBDQ8.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-MBDQ8.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/2324-155-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/2324-151-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/2324-152-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/2324-154-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/2332-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/2332-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/2332-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/3156-162-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-179-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-157-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-208-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-205-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-202-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-167-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-166-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-170-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-173-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-176-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-159-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-180-0x0000000000960000-0x00000000009FE000-memory.dmp

              Filesize

              632KB

            • memory/3156-183-0x0000000000960000-0x00000000009FE000-memory.dmp

              Filesize

              632KB

            • memory/3156-186-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-189-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-190-0x0000000000960000-0x00000000009FE000-memory.dmp

              Filesize

              632KB

            • memory/3156-193-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-196-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/3156-199-0x0000000000400000-0x000000000068F000-memory.dmp

              Filesize

              2.6MB

            • memory/4420-2-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4420-0-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4420-160-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB