Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2023, 02:22

General

  • Target

    36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.exe

  • Size

    7.5MB

  • MD5

    b38d83c56e4c91b201a7a75403da7158

  • SHA1

    6f5005ce5801453a1d13235984ea1addc0eb9290

  • SHA256

    36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e

  • SHA512

    6c474f39b9aae68543d780a80df4b0e48d009998965f88ee083243df9ecaa32c6452921c0785c5b2d333afaaa4a730bd8acc79aca1249ab4d7401de7c3facfc8

  • SSDEEP

    196608:iq/iLRC0OLkYNew6tjCtD2RQVsBp4UAzj:iHC9Lkuew6t2oCO9Azj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.exe
    "C:\Users\Admin\AppData\Local\Temp\36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Local\Temp\is-5J3CR.tmp\36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5J3CR.tmp\36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.tmp" /SL5="$A0064,7577497,68096,C:\Users\Admin\AppData\Local\Temp\36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2136
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
          3⤵
          • Executes dropped EXE
          PID:868
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
          3⤵
          • Executes dropped EXE
          PID:2760
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:4996

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\PlayGIF\gifplayer.exe

              Filesize

              1.8MB

              MD5

              aea74916f75c504535bc4be16a655af0

              SHA1

              aecb2c35c6ae288b65ed2920204c6597def957fe

              SHA256

              3aa057ea938ff856caea5dd51719393f40805d3480a129d1e528d3357cd7921d

              SHA512

              4f9aa4b360c3abbf9226ebfb6e6319c8e0c04e140ef9c6470b4cb8ee332eeceec73a1e5e858909357955549e41c9fb06db22a595e7a09803a9ac7c88e7a59aa9

            • C:\Program Files (x86)\PlayGIF\gifplayer.exe

              Filesize

              1.1MB

              MD5

              e1e594a89d001a2712347074ee1c381d

              SHA1

              46ef06f51a54edf1df224888a525423a0fe80773

              SHA256

              f8e7191ff0614248b4bed8d518c99632551a85d9582f76fc93f8e97196b43ab1

              SHA512

              7a2dfef327162eed86b5457ed000c8a79fb82e3d55ff92f041b0a2e9cacf28b6a415819046d279bda3a65686556adcd0a9143e375be20eb88b3697e6a78f215f

            • C:\Program Files (x86)\PlayGIF\gifplayer.exe

              Filesize

              420KB

              MD5

              944a3ed0ba7ead7aca8cea0bc7e42895

              SHA1

              66f60f3ea8108e2318cd67f2c6575bd79bf2d3f2

              SHA256

              0371561d2a7a3a858ccbadb1de4429edbbdedc51709c0fc5f067f91f639fe3b3

              SHA512

              ce820ad83e8c12783de89431f17c0ce7b569f309643c6277363e585fbba2e3d885289cf14b41c4a3dc36b1c97d482521546e80a1f9500d472f5836c09f90e1f8

            • C:\Users\Admin\AppData\Local\Temp\is-2C3S2.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • C:\Users\Admin\AppData\Local\Temp\is-2C3S2.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • C:\Users\Admin\AppData\Local\Temp\is-5J3CR.tmp\36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.tmp

              Filesize

              513KB

              MD5

              e010dc424b972c624fb8360858992251

              SHA1

              0af3777f22047808563e9f48d7a4009ebe2f3c3e

              SHA256

              c2e222a4afd4c070dcc463290033e56cb1ad2df62adbdf5ba1148a62e8bcc631

              SHA512

              2435f5d9d00438edea3390a29c7b47cf241030086417402a4657e65a23e176944ab2d9de1c76b299cda5e0fd265932a1927ee5f227e75a0838d1bdb7e5f78d75

            • C:\Users\Admin\AppData\Local\Temp\is-5J3CR.tmp\36fb90efd6e64ae176aac5d9737433aa01b0586eeec092ec21f3136b7d4b2f8e.tmp

              Filesize

              365KB

              MD5

              c09365a61fd393bbaca3e3e622dbbfdd

              SHA1

              ba73ee1f9705710acf2ae243b4ecca33fdc655f5

              SHA256

              8e9ecd62d20796c1c0c8518f85a330fb3242a314d1b66daeb37a1fde9229b612

              SHA512

              bd6b62ec081545b1ef9bc0d0b4b43be1d599d48c9335870785305849dd8c7fe14123726867c42861231f6b1466ecd3303825c1cf415b60306aebc83a85a5be23

            • memory/868-155-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/868-151-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/868-152-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/868-154-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2256-7-0x0000000002330000-0x0000000002331000-memory.dmp

              Filesize

              4KB

            • memory/2256-163-0x0000000002330000-0x0000000002331000-memory.dmp

              Filesize

              4KB

            • memory/2256-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/2760-162-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-179-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-208-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-157-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-205-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-202-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-166-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-167-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-170-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-173-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-176-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-159-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-181-0x0000000000880000-0x000000000091E000-memory.dmp

              Filesize

              632KB

            • memory/2760-186-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-189-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-190-0x0000000000880000-0x000000000091E000-memory.dmp

              Filesize

              632KB

            • memory/2760-193-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-196-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/2760-199-0x0000000000400000-0x0000000000666000-memory.dmp

              Filesize

              2.4MB

            • memory/4324-2-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4324-0-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4324-160-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB