Analysis
-
max time kernel
143s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
12/12/2023, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe
Resource
win10-20231020-en
General
-
Target
2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe
-
Size
7.2MB
-
MD5
42b5fbeaac4c0edd97288be103934abe
-
SHA1
3f31801e5c8845b9ed44b964ced5a0d2f53edd5c
-
SHA256
2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0
-
SHA512
e980bfed7aa29df258f2d58360353d0c092563a08188e6d28f2dcfde8924074fd41987c6305127df98f4a73346ff19765df3af76ef842426a3a19b392360d797
-
SSDEEP
196608:Axm5xCJOyhaLRyatbRgZIWFhoPd9qRvnTyGofmyq1zj:ncOycyKbf6i+E+P1zj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 3172 numgif.exe 5024 numgif.exe -
Loads dropped DLL 3 IoCs
pid Process 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.49.94.194 Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\numGIF\bin\x86\is-OLPA3.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-6QR3H.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-2CRU7.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\plugins\internal\is-CH30R.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-TAR6F.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\stuff\is-MG012.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\stuff\is-HLL6M.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File opened for modification C:\Program Files (x86)\numGIF\uninstall\unins000.dat 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-TV35N.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-VOJRP.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-72FD7.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-MS2G3.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-4DVI0.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-QR1TJ.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-LFAFJ.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-4R25J.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-M95MU.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-HD0EE.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-15DM2.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\stuff\is-HQFU2.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-QJP75.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-86RIA.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-ORA7J.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\uninstall\is-O2D6E.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-8FHI6.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-N6DAF.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-H5P23.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-M7LRJ.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-CRBGS.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-HHLHT.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-V7SC5.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-F72VF.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-MCV3T.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-809E9.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-KAOL4.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-DJGBI.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-QQTPP.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-G3R6C.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-583CL.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-3L4F4.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-MU6SC.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-R33AU.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\uninstall\unins000.dat 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-L43QG.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-9V23N.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-UERSI.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-CNH6Q.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-BO7FH.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-Q1UU1.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-KEFMQ.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\stuff\is-N4QIE.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-FPOPO.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-KJVTH.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\lessmsi\is-9GQ07.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\plugins\internal\is-8KF5N.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\is-PHAIF.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-54K7K.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-QDSDF.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-UV0AN.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-5NF1L.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File opened for modification C:\Program Files (x86)\numGIF\numgif.exe 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-AA1SH.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-V6G9T.tmp 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 924 wrote to memory of 4212 924 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe 71 PID 924 wrote to memory of 4212 924 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe 71 PID 924 wrote to memory of 4212 924 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe 71 PID 4212 wrote to memory of 1772 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 72 PID 4212 wrote to memory of 1772 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 72 PID 4212 wrote to memory of 1772 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 72 PID 4212 wrote to memory of 3172 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 73 PID 4212 wrote to memory of 3172 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 73 PID 4212 wrote to memory of 3172 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 73 PID 4212 wrote to memory of 2020 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 77 PID 4212 wrote to memory of 2020 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 77 PID 4212 wrote to memory of 2020 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 77 PID 4212 wrote to memory of 5024 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 76 PID 4212 wrote to memory of 5024 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 76 PID 4212 wrote to memory of 5024 4212 2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp 76 PID 2020 wrote to memory of 4616 2020 net.exe 78 PID 2020 wrote to memory of 4616 2020 net.exe 78 PID 2020 wrote to memory of 4616 2020 net.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe"C:\Users\Admin\AppData\Local\Temp\2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\is-U5MUH.tmp\2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp"C:\Users\Admin\AppData\Local\Temp\is-U5MUH.tmp\2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp" /SL5="$60158,7250749,121856,C:\Users\Admin\AppData\Local\Temp\2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:1772
-
-
C:\Program Files (x86)\numGIF\numgif.exe"C:\Program Files (x86)\numGIF\numgif.exe" -i3⤵
- Executes dropped EXE
PID:3172
-
-
C:\Program Files (x86)\numGIF\numgif.exe"C:\Program Files (x86)\numGIF\numgif.exe" -s3⤵
- Executes dropped EXE
PID:5024
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 123⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 124⤵PID:4616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD598f233e2b6fd6e29b3b435aae6a83342
SHA195597f964823d344dc58bbaaec0e8361af83feb4
SHA2563be9034126a3dbcbc41ac5dace07a1ef74e1a480a5a0bc077326fe1f1b322afa
SHA512564698e46590f8ece6ce2b0d9fb643b4b191ba39c64e050f458466a2d8bcfd91e4e0467488c54d14a267029343088843db215f25e6266f412d087e03fcb97477
-
Filesize
2.1MB
MD52ff16088fd512670326a9e39d8ab538d
SHA1d0db17587d3b9c520d734e4c507342c9ac08336f
SHA256bcf6bc779d624ac7ddba50090cf317c1eb7849726fc8925e9e824257aef36ccc
SHA5129755bc811d4c65359e429f54cfbe67e83996ee3debff4b546c9da516558c9349c2562e762d7d45ffa6626cf2c21a2c727948356545ae2d5098bda0426f7f2d18
-
Filesize
71KB
MD591b16a043008ae778ee12ba802d1b126
SHA1684222a16fd7a5105aa2fe3b51a177b5d8652c12
SHA256d0415ecfd737cff19b83f97c1c8f5fcdd2262dcfedec814b2299d0aaa57dcb14
SHA51291037a1cd273101307ee546e5f7cd01a6fad68ab7a8b049bb73050ec883df02d5d5f5801515100f2c7fc1369b5093161b47907520e8d54ebe902b13f18405668
-
C:\Users\Admin\AppData\Local\Temp\is-U5MUH.tmp\2a83f0da6905a6536f2a36621864a46689d7e300bba83ef42ea8f48eb42319e0.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303