Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2023 07:05

General

  • Target

    ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea.exe

  • Size

    7.7MB

  • MD5

    0124f866b15f197e4aa0f8c330128bcc

  • SHA1

    e64900e1705961c423983612c0998b1c98f64620

  • SHA256

    ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea

  • SHA512

    34889d5ecb33cb3f776fdd5bbd43814f4c3f8c1bccbedce2fbc047349d88aca44f097e9e1eb778014f0ccca1bf61190114ca7855f863f92adf8eff3851d108bb

  • SSDEEP

    196608:2xm5HA1KCTO4UADzhIbVSJ2OXiZKIWl0YIwRKE6/lzj:7A1KCTvZ1kOXiZKIWlgw0zj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea.exe
    "C:\Users\Admin\AppData\Local\Temp\ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\is-3HAKN.tmp\ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3HAKN.tmp\ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea.tmp" /SL5="$701CC,7812418,121856,C:\Users\Admin\AppData\Local\Temp\ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4940
        • C:\Program Files (x86)\GIFMount\gifmon.exe
          "C:\Program Files (x86)\GIFMount\gifmon.exe" -i
          3⤵
          • Executes dropped EXE
          PID:4468
        • C:\Program Files (x86)\GIFMount\gifmon.exe
          "C:\Program Files (x86)\GIFMount\gifmon.exe" -s
          3⤵
          • Executes dropped EXE
          PID:2724
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 12
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 12
            4⤵
              PID:3344

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\GIFMount\gifmon.exe

        Filesize

        1.7MB

        MD5

        6b025e49b3429ec02435a2d14277df0a

        SHA1

        70d86279299b1c8401410e65b83c8035c6874e14

        SHA256

        51908028b72475fe2e2fc2dbf087cd0b244a74e5ed6ab2ee13f07ed24124ff83

        SHA512

        6aa620e5b78b593781e029b4b22f1618e9fae8448cce37ed59adfd676bdb2994e6f0a05e346107c773c4b4aedf48d441592ff32295bbb78158d5e1ab30d4e043

      • C:\Program Files (x86)\GIFMount\gifmon.exe

        Filesize

        2.0MB

        MD5

        df1606d784ee1a3d17611b6c58a20ac4

        SHA1

        f8b64fec70751f76eb7ccd92e667e71a7df9c87f

        SHA256

        6fd25d7d6d4cd5a8c3b837cb8424b1fb6d48d784aff45976df27a274e5795c8a

        SHA512

        57521350aa844771053601138df44b01d15270a18965cef7c54fdb42790a36d44ce6b46e474915f94d55d87899ee834dabc72d84b97f06778dd88212bb464f15

      • C:\Program Files (x86)\GIFMount\gifmon.exe

        Filesize

        1.4MB

        MD5

        fff549a02f3f092039c8d950bbd4fb76

        SHA1

        0ecf435410f5e3e71d5bdb55e154626b0b2e6b90

        SHA256

        a18499e4366ea51160c4f6275f2412cded8e7afcbe69a2221a0620b08ebda8e5

        SHA512

        97eb2ba953b5f32fe6163054779128c8eaf368e73499d84c93c078a4b1e81d84e24238e63b9cbbc50a9f5c0b49c2f70adeb013b4d2f89830f224e1a8437f3823

      • C:\Users\Admin\AppData\Local\Temp\is-062RT.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-062RT.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-3HAKN.tmp\ced0d99d1767f2f688a8b81ef2db02f4dc35c304b6a8415e0c0c2f248382b8ea.tmp

        Filesize

        687KB

        MD5

        f448d7f4b76e5c9c3a4eaff16a8b9b73

        SHA1

        31808f1ffa84c954376975b7cdb0007e6b762488

        SHA256

        7233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49

        SHA512

        f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4

      • memory/2724-179-0x00000000007E0000-0x000000000087E000-memory.dmp

        Filesize

        632KB

      • memory/2724-189-0x00000000007E0000-0x000000000087E000-memory.dmp

        Filesize

        632KB

      • memory/2724-207-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-204-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-201-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-198-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-195-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-158-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-192-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-188-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-161-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-185-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-165-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-166-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-169-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-172-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-175-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-178-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/2724-180-0x00000000007E0000-0x000000000087E000-memory.dmp

        Filesize

        632KB

      • memory/3116-162-0x0000000002200000-0x0000000002201000-memory.dmp

        Filesize

        4KB

      • memory/3116-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3116-12-0x0000000002200000-0x0000000002201000-memory.dmp

        Filesize

        4KB

      • memory/4468-155-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-153-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-152-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-151-0x0000000000400000-0x000000000069B000-memory.dmp

        Filesize

        2.6MB

      • memory/5048-0-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/5048-159-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/5048-2-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB