Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2023 01:23

General

  • Target

    8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.exe

  • Size

    7.5MB

  • MD5

    1336fe1d3296b098c7a30611f35a452d

  • SHA1

    feef5bf3fe2e4638e231313c8e84c929cb939cbe

  • SHA256

    8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e

  • SHA512

    af770f0a0730403b497ef714ed1aca7b28a0428b3ebaecb750f750b37d30f09fdb3aa8419758683a23a6a1118317dc03df529f66c929505349a0dfd4d8e5bba3

  • SSDEEP

    196608:Vq/iLRC0OLkYNew6tjCtD2RQVsBp4UAzj:VHC9Lkuew6t2oCO9Azj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.exe
    "C:\Users\Admin\AppData\Local\Temp\8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\AppData\Local\Temp\is-2F1DC.tmp\8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2F1DC.tmp\8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.tmp" /SL5="$50190,7577497,68096,C:\Users\Admin\AppData\Local\Temp\8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:668
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
          3⤵
          • Executes dropped EXE
          PID:3176
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4612
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1260
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:376

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.4MB

        MD5

        53ceb15e957c10e30fbc872c5c98c75d

        SHA1

        408e7aa378211cc1574b196520695fb9c5db5fd7

        SHA256

        9dc94cf36401fe2e3aa374ddb965f7e36fcc1b97f2bd031c00c2e371d632909c

        SHA512

        fee7781db42a6c0662752fea31585c870bfda30c2c765ba7691c0a95f5810f51cbad4f04e09133e0b9c0b29bfb20a4cbcc262938f3e7a738269b2da5db0734e8

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.6MB

        MD5

        9521aaa27cbf2250eb2dabecdb51c3a8

        SHA1

        a49908bed76392a61a9c445813e93e37b7fd77b2

        SHA256

        8b868e60a698138efb8b18f19771535b369e1131a39e37977aba911eb4797809

        SHA512

        9e4190b55e189ddbc858d98089a0f62a5a51a6120b4fac229ca89cdd5aff4a26b2ac05272de01116f1005da94215175dff1bfed003888f071871d6e94d3b5009

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        802KB

        MD5

        e3e26dd4d14fa6c7b4e2d17c38f3be6d

        SHA1

        0c2a50eb894818dfb66b51c3f8c7668273b03414

        SHA256

        a72c6e9e20b2cf7a6ab7d02fab795176786d63032f1482be9ddb03ea1fc993cb

        SHA512

        e02754fe4fd3fa09a61e4cb224b9a8a8c951509149babf3093cdd9cd552067061cfa3755b422d1391fefc42bc2f72a0bd558afd9d5cc9e94f586125a935bcae9

      • C:\Users\Admin\AppData\Local\Temp\is-2F1DC.tmp\8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.tmp

        Filesize

        522KB

        MD5

        724ae7a083f8785d353e8a0a8c130db6

        SHA1

        f84f8abce1e3b900dbac554713973eed4736e716

        SHA256

        1ae9ca33bf70b5cd08df457931463c8e859f99f387d9e663eef664836dbabf72

        SHA512

        6240bc22775b05447c0568a6c9808da2dc949dbfa9f484ec0c770fc322e235b00b452007dcb537f4c680a22cb18edf26da33215fbc68e3cab83cec1801ec4c84

      • C:\Users\Admin\AppData\Local\Temp\is-2F1DC.tmp\8640fd42a12bc042bbcb22a463b90144a8454bde63f7bedf6c2d213659d2515e.tmp

        Filesize

        246KB

        MD5

        e90c6df9080b519095fb9fca735ff910

        SHA1

        032946c353e6f47aa9bb365f739b778cf9f0e122

        SHA256

        431fff16289a4db6a419621e275fa8a8716dfc713ea2c9fe108682f73072a86e

        SHA512

        4af023dac110631164465fb7550d853360e01ae10bb9ab04fc757aa691a82c5eb35ad05222e5fa38e1a8042f25f469c132008f10bf8ea5b1add3a84f6682684e

      • C:\Users\Admin\AppData\Local\Temp\is-U7TKB.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-U7TKB.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/860-7-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/860-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/860-163-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/1144-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1144-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1144-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3176-151-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/3176-152-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/3176-154-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/3176-155-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-162-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-180-0x00000000009A0000-0x0000000000A3E000-memory.dmp

        Filesize

        632KB

      • memory/4612-157-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-166-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-167-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-170-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-173-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-176-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-179-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-159-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-181-0x00000000009A0000-0x0000000000A3E000-memory.dmp

        Filesize

        632KB

      • memory/4612-186-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-189-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-190-0x00000000009A0000-0x0000000000A3E000-memory.dmp

        Filesize

        632KB

      • memory/4612-193-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-196-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-199-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-202-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-205-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4612-208-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB