Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2023, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
tuc6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
tuc6.exe
Resource
win10v2004-20231127-en
General
-
Target
tuc6.exe
-
Size
7.2MB
-
MD5
9d20529c12d976fc0ac1c6307742bb70
-
SHA1
11d0c9e1a660a30d27a90212b1bda83663bd5e3f
-
SHA256
fef27f6e75c7b46bd160664e0c4d23454c41619b371c199d5c9341eac5eb020f
-
SHA512
4141606a22d0af3ff8f4943ee3845e9d3f58aece6b2a33ceaf93b201d0a752bbdf371a2ec0e98fbc8c719b02b348f8328a4830612fbd88f15fa00c2d88bf828b
-
SSDEEP
196608:nxm56Uu8mvAF2l3qqRHw/djqMJueNbMvn+pXnhH5RCLK5Ehezj:Yul8A3nHwljqMksY/4p5RC25qezj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 896 tuc6.tmp 3448 numgif.exe 4064 numgif.exe -
Loads dropped DLL 3 IoCs
pid Process 896 tuc6.tmp 896 tuc6.tmp 896 tuc6.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\numGIF\bin\x86\is-UO6RK.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-CHGT9.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-94KDF.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-QE5DP.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-9U9R2.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-6G2RC.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-LA09P.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\stuff\is-QSNQ6.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-U1VV3.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-PL6AA.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-LR5P1.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-EP57T.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-CBPCJ.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-RANFH.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\stuff\is-J0IRV.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-AOBKE.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-M9HKN.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\lessmsi\is-6KHB1.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-LI6IQ.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-LKJUV.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-SHE99.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-JOJMD.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-LGAL3.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-4E1JC.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-BGL07.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-9SL6V.tmp tuc6.tmp File opened for modification C:\Program Files (x86)\numGIF\numgif.exe tuc6.tmp File created C:\Program Files (x86)\numGIF\uninstall\unins000.dat tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-FU5VK.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\uninstall\is-MCERR.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-3HK7T.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-S9JS6.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-2TQGP.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-IDAKU.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\is-1G4MD.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-BRT27.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-UVTA1.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\plugins\internal\is-G2604.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\plugins\internal\is-QB293.tmp tuc6.tmp File opened for modification C:\Program Files (x86)\numGIF\uninstall\unins000.dat tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-FISNJ.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-MLTBO.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-L47B9.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-L827C.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-EFJM1.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-T0FAS.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-07GTH.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-96UUS.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-KJBQF.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-EM37A.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-3R42J.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\stuff\is-A546J.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-A0NR0.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-ULL49.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-P8U0K.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-M4B93.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-VDSSL.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-ORVVN.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-T2C68.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-GT7C5.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-EJQTV.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\stuff\is-8MCNB.tmp tuc6.tmp File created C:\Program Files (x86)\numGIF\bin\x86\is-HQPBE.tmp tuc6.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 896 tuc6.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4628 wrote to memory of 896 4628 tuc6.exe 87 PID 4628 wrote to memory of 896 4628 tuc6.exe 87 PID 4628 wrote to memory of 896 4628 tuc6.exe 87 PID 896 wrote to memory of 2488 896 tuc6.tmp 90 PID 896 wrote to memory of 2488 896 tuc6.tmp 90 PID 896 wrote to memory of 2488 896 tuc6.tmp 90 PID 896 wrote to memory of 3448 896 tuc6.tmp 91 PID 896 wrote to memory of 3448 896 tuc6.tmp 91 PID 896 wrote to memory of 3448 896 tuc6.tmp 91 PID 896 wrote to memory of 4364 896 tuc6.tmp 95 PID 896 wrote to memory of 4364 896 tuc6.tmp 95 PID 896 wrote to memory of 4364 896 tuc6.tmp 95 PID 896 wrote to memory of 4064 896 tuc6.tmp 93 PID 896 wrote to memory of 4064 896 tuc6.tmp 93 PID 896 wrote to memory of 4064 896 tuc6.tmp 93 PID 4364 wrote to memory of 3352 4364 net.exe 96 PID 4364 wrote to memory of 3352 4364 net.exe 96 PID 4364 wrote to memory of 3352 4364 net.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\tuc6.exe"C:\Users\Admin\AppData\Local\Temp\tuc6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\is-2PCO5.tmp\tuc6.tmp"C:\Users\Admin\AppData\Local\Temp\is-2PCO5.tmp\tuc6.tmp" /SL5="$60066,7260641,121856,C:\Users\Admin\AppData\Local\Temp\tuc6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2488
-
-
C:\Program Files (x86)\numGIF\numgif.exe"C:\Program Files (x86)\numGIF\numgif.exe" -i3⤵
- Executes dropped EXE
PID:3448
-
-
C:\Program Files (x86)\numGIF\numgif.exe"C:\Program Files (x86)\numGIF\numgif.exe" -s3⤵
- Executes dropped EXE
PID:4064
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 123⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 124⤵PID:3352
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687KB
MD593bbe736724089f9eb67ea8bdf9d9cc1
SHA1ea27cb2269dfa9b7d387fe739a7b680d7500af85
SHA256f202339b10f721b4a1e2cc8d34e0dde00091aee6fbfd4a44a1a6e85056e858b1
SHA512c9b5e565b4beba487868ef1cc4bf6375879e5bc43c66a7bca14802c82e44cb8579f193db80a37663fc73d76ad431c1c0f1980ce04007f902d6722b8d7a3e2afa
-
Filesize
1.0MB
MD5b16c0ab9dae54b29aff94c36b959aad7
SHA10b71b01d610d4d3d2150f8f492fd58b1bc1773cb
SHA256098add8b9170325828f8e122bfab7a2619a89d74c00e4312ab2fa25d71130c87
SHA5121a3449dabf8ce573cabcf70f4ed4106705c114a93331b4be58271ba582c5890e6229d6f04434f8bce79c4b4757e78854b99c6fc9beadbc23381b203750d3054a
-
Filesize
187KB
MD5b4ae7ec81889ac408264f29ba0ef5a0f
SHA1ade73f9f02496f8354780c8a5501783d4cfdbefe
SHA2563c92d8058d7f00f67aef8a10c9afd90182c94b163b3dab0e025c75d2c5ff124a
SHA512b4388728430bcdcda326f6a7cc609d8dc43f1f44a11f11c8f4e9bca68bd0de0612f9038f2ec7a20528308b99b7c7ebe021885e914762141795415bf49ba579d2
-
Filesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303