Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2023, 14:36

General

  • Target

    4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.exe

  • Size

    7.0MB

  • MD5

    35e270c9bfa3e7ab95c010a18af60b9b

  • SHA1

    dbbd2cfa5e50f7245912039cd7fc66717b0d9a55

  • SHA256

    4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760

  • SHA512

    af67812c9ff3faec4848db1809c80e963679ba248dd84a79468efa8f7132347790afecbe2c16474f88fc4706a60cf59725d8dcbbe5cc096a0a0fb515ef033bfe

  • SSDEEP

    196608:wxm5Z7xPjWtYOkdHWd1V3GaO4TwWHvzASW8P7Bzj:/7RjWtfj95dLASWyzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.exe
    "C:\Users\Admin\AppData\Local\Temp\4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\is-N4PRG.tmp\4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-N4PRG.tmp\4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.tmp" /SL5="$C0060,7089240,121856,C:\Users\Admin\AppData\Local\Temp\4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4992
        • C:\Program Files (x86)\numGIF\numgif.exe
          "C:\Program Files (x86)\numGIF\numgif.exe" -i
          3⤵
          • Executes dropped EXE
          PID:4240
        • C:\Program Files (x86)\numGIF\numgif.exe
          "C:\Program Files (x86)\numGIF\numgif.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4304
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 12
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3892
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 12
            4⤵
              PID:3948

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\numGIF\numgif.exe

              Filesize

              2.0MB

              MD5

              e4a8032541379455f84bccfe4920d9da

              SHA1

              ab9ed80023a2c08705234d5057a4cab860d87a2b

              SHA256

              45b27c8d70b72412f6d1f3b5e08262318d1e87490bb31c4f29975e0f87e192af

              SHA512

              72468e314b80bb9b4ab658676e7f8a19062cf2c3af0fb29b06c56924d2718319669d7f8cc37959072d376aa0e4119fea6674697021816b6ce5ce1c1f7c05e03f

            • C:\Program Files (x86)\numGIF\numgif.exe

              Filesize

              1.2MB

              MD5

              6c60f39fb327238012871742b913eb8a

              SHA1

              6d8ac76bb5255dc7dd51287b2135e78809c8a243

              SHA256

              57185ca0e73d93064f19b95d55b00891ed342bf122d3544d13cc6c3d0cc78237

              SHA512

              8399cd81fe9bade975b10641eb0b840f0b7c801c8b710ee1529b89095a8faa8a4ce86b429b7a784fff737d9442f9c51e29172e82b56ab8863ffb793ccac5e648

            • C:\Program Files (x86)\numGIF\numgif.exe

              Filesize

              1.3MB

              MD5

              681e7886a895315b2a9e1e23d7e8444d

              SHA1

              1a4b79f7f160e02e200085552ef143edba6350ff

              SHA256

              03961599d7e05720a5542564b7abf428fdcdcba497a1ab19814a9aca109a0e38

              SHA512

              35a2eaa02db99307c3544dfbb4ad1d4c54970c7fcecfafceb8d879e125d8079965575785ff946d4be04f4fd2214466a4f141e50583c004b8841ce8d999962ae3

            • C:\Users\Admin\AppData\Local\Temp\is-JPI2M.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • C:\Users\Admin\AppData\Local\Temp\is-JPI2M.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • C:\Users\Admin\AppData\Local\Temp\is-N4PRG.tmp\4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.tmp

              Filesize

              51KB

              MD5

              c2f7cc56b0e193b9c757aa8bffcd212e

              SHA1

              862bc634ad03ba33fc51dd8a7f35fdf633cf71c3

              SHA256

              b82c8d99a0e96bf3f37b88abf353b7168ab62b05f20ae68db56c135695af9980

              SHA512

              ca0c4ee44d9dc1f10b61a13e412815e97bddd6cd1ff4050fdd45679d5f205ab88f66c62ca4ebdba64d625ede0c3eca63c4136a462a3f04566390bf5fed22cb6a

            • C:\Users\Admin\AppData\Local\Temp\is-N4PRG.tmp\4f552d26ce7106a5520bcd6dc3cae45072158980e862721239c694b4f8df1760.tmp

              Filesize

              12KB

              MD5

              0770169743d8918113b465a9c3c3d3f5

              SHA1

              e3117e0deadd4d11a3973ac3a033396b7b25ccb7

              SHA256

              ce411c92a395e42f69bb41ccc0a5dabf2699f9ffb7f4c7225ff74e1140355da7

              SHA512

              41d0d73c4fc98c2c6ad3e8ed65d93d4169c01c2bfab8e4a9cd27ee4c0569aaff2e5aaa68a949728306f6bc52748e9f9834fe01ace8e33af18db56bad112ba2bf

            • memory/2556-2-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/2556-0-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/2556-159-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB

            • memory/3484-7-0x0000000000750000-0x0000000000751000-memory.dmp

              Filesize

              4KB

            • memory/3484-162-0x0000000000750000-0x0000000000751000-memory.dmp

              Filesize

              4KB

            • memory/3484-160-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/4240-151-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4240-152-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4240-155-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4240-153-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-178-0x0000000000890000-0x000000000092E000-memory.dmp

              Filesize

              632KB

            • memory/4304-182-0x0000000000890000-0x000000000092E000-memory.dmp

              Filesize

              632KB

            • memory/4304-165-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-166-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-169-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-172-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-175-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-158-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-179-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-161-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-185-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-188-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-189-0x0000000000890000-0x000000000092E000-memory.dmp

              Filesize

              632KB

            • memory/4304-192-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-195-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-198-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-201-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-204-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB

            • memory/4304-207-0x0000000000400000-0x00000000005F7000-memory.dmp

              Filesize

              2.0MB