Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/12/2023, 10:50

General

  • Target

    e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857.exe

  • Size

    7.2MB

  • MD5

    08276561900b304c7c77147950abfa4f

  • SHA1

    e4f3cfcd339eed20c3d1e8a4121b1746fa64536c

  • SHA256

    e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857

  • SHA512

    ff63d78454996c25a2d47854d8052838d7cde7cc1f851a8215ceec3a63cb5bbb8371aa409d6ad3c2f4417a7ad83756538ef1b071afbbdda92fde5aa8c17cea51

  • SSDEEP

    196608:Txm5EEwkzysVKr9L3VLEQtNO8LakngzHEGWzj:vkzYr97tEeXqjEFzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857.exe
    "C:\Users\Admin\AppData\Local\Temp\e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Users\Admin\AppData\Local\Temp\is-AFI9U.tmp\e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AFI9U.tmp\e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857.tmp" /SL5="$80202,7250593,121856,C:\Users\Admin\AppData\Local\Temp\e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:444
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:1508
        • C:\Program Files (x86)\numGIF\numgif.exe
          "C:\Program Files (x86)\numGIF\numgif.exe" -i
          3⤵
          • Executes dropped EXE
          PID:3448
        • C:\Program Files (x86)\numGIF\numgif.exe
          "C:\Program Files (x86)\numGIF\numgif.exe" -s
          3⤵
          • Executes dropped EXE
          PID:5036
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 12
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 12
            4⤵
              PID:3956

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\numGIF\numgif.exe

              Filesize

              1.0MB

              MD5

              75ecd78223314640c6660f07977679d2

              SHA1

              dc396017c6a1d85be6c5ab65fd26a17364f40aef

              SHA256

              b65d41ebb202094560045278471726d980b8ee87bc61c23ff1fbd5d6e2298707

              SHA512

              c6f3c0e9f7ac65b4457bc82de013e1d4c0bc561138c95c93e92e0db03623a2f2b214ec1ee6493ff341979e69dbf85c5465505e4a8fef1c80ed98305148dc1651

            • C:\Program Files (x86)\numGIF\numgif.exe

              Filesize

              866KB

              MD5

              f07a9177692af3ee64e2ca90654f2d58

              SHA1

              8d7911463f586b99b3accfccfd5ba02015b1ff70

              SHA256

              3d1eb36f7049d2b9b839dd99d72d6818ce7ce226a505dd65063a1b382798cf22

              SHA512

              7902d5a2d8e318002a1ddd77c9b938d61356892c47ed68fbf12b64a6da1368cd546c1e1ecbbb2854c8c342ef75ad6f594382626e514a8e8da8f5ef1a533a5881

            • C:\Program Files (x86)\numGIF\numgif.exe

              Filesize

              156KB

              MD5

              0ab9a81e18ecd541c43db11cce92f91e

              SHA1

              3b381080cc61ae97fe9da0be222f7e7733928c92

              SHA256

              f953f3526a3fb42fc1e58b6c381b82c0b0f9e58e4eb4dc2c22150504a4cfe54e

              SHA512

              58271126844763f27263088cd0c281d8f8aee9534f033968505c9f5a3ec409c6b152e129a6cb6ba605176749ab0a51a0a6c5fc3dfb63a35f94b79feb01a330e2

            • C:\Users\Admin\AppData\Local\Temp\is-AFI9U.tmp\e98793f4766c4d285fc62dc5663da9104ad6bc627255d5a485e72b19769fd857.tmp

              Filesize

              687KB

              MD5

              f448d7f4b76e5c9c3a4eaff16a8b9b73

              SHA1

              31808f1ffa84c954376975b7cdb0007e6b762488

              SHA256

              7233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49

              SHA512

              f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4

            • \Users\Admin\AppData\Local\Temp\is-8S2HI.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-8S2HI.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/444-10-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/444-162-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/444-160-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/3448-151-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/3448-152-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/3448-155-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/3448-154-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/3624-0-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/3624-2-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/3624-159-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/5036-161-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-182-0x00000000008B0000-0x000000000094E000-memory.dmp

              Filesize

              632KB

            • memory/5036-165-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-166-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-169-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-172-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-175-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-179-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-178-0x00000000008B0000-0x000000000094E000-memory.dmp

              Filesize

              632KB

            • memory/5036-158-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-185-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-188-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-189-0x00000000008B0000-0x000000000094E000-memory.dmp

              Filesize

              632KB

            • memory/5036-192-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-195-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-198-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-201-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-204-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB

            • memory/5036-207-0x0000000000400000-0x0000000000627000-memory.dmp

              Filesize

              2.2MB