Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2023 02:45

General

  • Target

    f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.exe

  • Size

    7.6MB

  • MD5

    c641e8215faf4683356dd35edb2527ba

  • SHA1

    17da4de36f22cda315702d092a79d97465318e9d

  • SHA256

    f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40

  • SHA512

    9a8b6d0bfad68525b0293ef25a27b756c5144b7c4001a6a28856e4bc2f00b1ee1bf289c7cac8329ccbf0d134b622c7bef3a8dc74d44416ebd619f828f1ccc7fd

  • SSDEEP

    196608:6nnY8NWvGpWTTlm0OxwW+nFnfZsMUdFt30Dzj:6nnY8NELTIrxwlxQWDzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.exe
    "C:\Users\Admin\AppData\Local\Temp\f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\is-6SCHF.tmp\f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-6SCHF.tmp\f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.tmp" /SL5="$9006C,7715663,68096,C:\Users\Admin\AppData\Local\Temp\f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4616
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4336
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4084
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:1944
          • C:\Program Files (x86)\PlayGIF\gifplayer.exe
            "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
            3⤵
            • Executes dropped EXE
            PID:3276

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.7MB

        MD5

        3460e630e56a589e9c7bcdb4a83419db

        SHA1

        e431583f750a51cea5a323e2beafc6092f1e1a7b

        SHA256

        f713b4220ffd0ea9cf653bb9aa029fe710c7fd4061c3be5bbbe7e09d82d319af

        SHA512

        0597fef4438ce23ac83b839119df45db5c0c6a6d81556893b1b33dae739f65c7e47564febb624e3588e2b9cbbdb91082a79053acc88c913ff5b7d9a48b3643db

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.4MB

        MD5

        6c14f89f24b83607e7183b9b44c10e4c

        SHA1

        aeecc9333277587c76d723e57ca10aca0efab1f1

        SHA256

        0121e702882a1f871eca3f6e439b4b0c77bcba130206274f8e38c2434fb95c2d

        SHA512

        e3c7ca608feb7fe82850c65febe77dc89e7f5a5b8837d58ac554534b81f11c44b117bf566af0e537d29e148036efa446d6558bca544a2d5ea155745dbe574c2f

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.5MB

        MD5

        0fdcdc16d6268b05c08f2cce1265a9e8

        SHA1

        42921374efd73e5b145bff03ebc888bb2dea9696

        SHA256

        49f9092608af412466cf86002add4c0eba4a7f040e2871b286a130dbd2198339

        SHA512

        0221f3b99dfdfb2aa6e56e3d2eeb1763bd525fa380665c832e3d56866f7c12a8b746ae96d2421678ea146580aba0af3c1f156f973f4f7d42b2574d273cdbd143

      • C:\Users\Admin\AppData\Local\Temp\is-6SCHF.tmp\f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.tmp

        Filesize

        323KB

        MD5

        3237e37a748b676da4c064645313887b

        SHA1

        48f58428bedcb51900e0f3d6c8a3fac70f1dc268

        SHA256

        f9ce20bc6dae337e4d81892a2fc8dcf263748ee31851d09868d884018c50f84e

        SHA512

        b92726db4173caef285394b08d14797992306b0388e83a1ffc1ac928608768cfad2bc2396968850cbe46968926d23673e09c18f20b875d9047d3aa2c58cb77ec

      • C:\Users\Admin\AppData\Local\Temp\is-6SCHF.tmp\f12c62886fe02acd9c4528c6c2169ff3f2ad785fe1a0d748dad603922d8cdf40.tmp

        Filesize

        506KB

        MD5

        3ec26ca8c394f2a1875301342f08b708

        SHA1

        f32705886d6cbde599c4eb1924a8c5ee65fead8c

        SHA256

        172d4cf940fe7dbe5780a9ae33bc21b586361a3e72982b663c804b658d8279d5

        SHA512

        a6a24865dae3a4c4f0558005280635f261ab67e950b64b6c1c65a6392452c529a0a876bd9b5f38e3130b8823436949cffed33b5136ce381155e8b4beffdb7075

      • C:\Users\Admin\AppData\Local\Temp\is-G813S.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-G813S.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/1488-163-0x0000000002100000-0x0000000002101000-memory.dmp

        Filesize

        4KB

      • memory/1488-7-0x0000000002100000-0x0000000002101000-memory.dmp

        Filesize

        4KB

      • memory/1488-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3276-162-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-189-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-209-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-206-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-158-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-159-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-202-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-199-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-196-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-193-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-166-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-167-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-170-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-173-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-176-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-179-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-180-0x0000000000900000-0x000000000099E000-memory.dmp

        Filesize

        632KB

      • memory/3276-181-0x0000000000900000-0x000000000099E000-memory.dmp

        Filesize

        632KB

      • memory/3276-186-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/3276-192-0x0000000000900000-0x000000000099E000-memory.dmp

        Filesize

        632KB

      • memory/4536-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4536-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4536-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4616-154-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4616-151-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4616-152-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4616-155-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB