Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/04/2024, 14:10

General

  • Target

    c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe

  • Size

    2.4MB

  • MD5

    55f780ea4dc5a5401b80915d69a55481

  • SHA1

    5ebdde7f87637493de0a5e7a4ffcd59839672c4e

  • SHA256

    c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70

  • SHA512

    680ca9d6f5aa4d53e7083858bfd4d3fc71f567993968edc83ddf262e15b2ed06f07c5a4c47e65f4874074213adf3cd978b8eaa658563694caf013fb126948697

  • SSDEEP

    49152:zgwRtL9Hckjh40JEvPXJnxNH0IHK61VW/2t+YKpEv6o2sUX7fEgvr:zgwRB98kj3JCPF71HKAV3+YAEaZ7fEgj

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe
    "C:\Users\Admin\AppData\Local\Temp\c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Windows\SysWOW64\sc.exe
        Sc delete GameServerClient
        3⤵
        • Launches sc.exe
        PID:5084
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        GameService remove GameServerClient confirm
        3⤵
        • Executes dropped EXE
        PID:2996
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        GameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
        3⤵
        • Executes dropped EXE
        PID:4188
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        GameService start GameServerClient
        3⤵
        • Executes dropped EXE
        PID:3304
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Windows\SysWOW64\sc.exe
        Sc delete GameServerClientC
        3⤵
        • Launches sc.exe
        PID:5116
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        GameService remove GameServerClientC confirm
        3⤵
        • Executes dropped EXE
        PID:2036
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        GameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
        3⤵
        • Executes dropped EXE
        PID:2688
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        GameService start GameServerClientC
        3⤵
        • Executes dropped EXE
        PID:3880
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
      2⤵
        PID:4876
    • C:\Program Files (x86)\GameServerClient\GameService.exe
      "C:\Program Files (x86)\GameServerClient\GameService.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Program Files (x86)\GameServerClient\GameServerClient.exe
        "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3416
        • C:\Windows\Temp\91361.exe
          "C:\Windows\Temp\91361.exe" --list-devices
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2436
    • C:\Program Files (x86)\GameServerClient\GameService.exe
      "C:\Program Files (x86)\GameServerClient\GameService.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Program Files (x86)\GameServerClient\GameServerClientC.exe
        "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Windows\Temp\955927.exe
          "C:\Windows\Temp\955927.exe" --coin BTC -m ADDRESSES -t 0 --range 319e9147380000000:319e91473a0000000 -o xxx0.txt -i C:\Windows\Temp\curjob.bin
          3⤵
          • Executes dropped EXE
          PID:2572

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\GameServerClient\GameServerClient.exe

            Filesize

            2.5MB

            MD5

            bf4360d76b38ed71a8ec2391f1985a5f

            SHA1

            57d28dc8fd4ac052d0ae32ca22143e7b57733003

            SHA256

            4ebec636d15203378e15cc11967d00cbd17e040db1fca85cf3c10bbf7451adaf

            SHA512

            7b46bc87dc384d8227adf5b538861165fa9efa18e28f2de5c1a1bb1a3a9f6bef29b449706c4d8e637ae9805bb51c8548cb761facf82d1c273d3e3699ae727acd

          • C:\Program Files (x86)\GameServerClient\GameServerClientC.exe

            Filesize

            13.2MB

            MD5

            41b332ddc0b2faad06c4e94f689803af

            SHA1

            f30985161ff56a9a6af7e8c5e666494513e587ba

            SHA256

            49c32c99e5602a6fa8c8d0df198f0e3bb530777384d5103e90630a1b94f65ab0

            SHA512

            808b9c909741ebe64feb24c18b5dd9a802501adaa793670b899cdb26375baa0d35095b74cde768c462a085d76c4129abe7c8523132f5836c4e1ea2b081b755e1

          • C:\Program Files (x86)\GameServerClient\GameService.exe

            Filesize

            288KB

            MD5

            d9ec6f3a3b2ac7cd5eef07bd86e3efbc

            SHA1

            e1908caab6f938404af85a7df0f80f877a4d9ee6

            SHA256

            472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c

            SHA512

            1b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4

          • C:\Program Files (x86)\GameServerClient\installc.bat

            Filesize

            244B

            MD5

            a3d3d85bc0b7945908dd1a5eaf6e6266

            SHA1

            8979e79895226f2d05f8af1e10b99e8496348131

            SHA256

            3aad1c9feb23c9383ee7e5c8cb966afd262142b2e0124b8e9cda010ea53f24c6

            SHA512

            9184b09bdc10fb3ec981624f286ab4228917f8b1f5cbec7ee875d468c38461395d970d860e3ff99cb184e8839ed6c3ca85a9eaffdd24f15c74b311623c48f618

          • C:\Program Files (x86)\GameServerClient\installg.bat

            Filesize

            238B

            MD5

            b6b57c523f3733580d973f0f79d5c609

            SHA1

            2cc30cfd66817274c84f71d46f60d9e578b7bf95

            SHA256

            d8d718641bdf39cca1a5db7bb52d3c66d400a97bef3cafdd81cd7e711a51c570

            SHA512

            d39440163592bc3b1cb7830f236a97d5819c10775e453637d5a04a981e9a336480c6b4701afdceba0d52dfe09413b7abe2ad58ff55b5057a26229f3ccdc3a7c7

          • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

            Filesize

            300B

            MD5

            f4642873a793f4d4976f9f8d5202661f

            SHA1

            8a9197c6b042f9132cbe1a0170e3f7314dc289e4

            SHA256

            6bba718313322bf326c9dfe517562061ac108eadde857f3e0861fd742cef2cbd

            SHA512

            e6067dee7e8a52b9ca05bf0655891dda222b0fefd68198f02c56b691f65c238198cabb96122967d9fee4c0933c68531530e3c3666edda99fa3a2f5b307455261

          • C:\Windows\Temp\91361.exe

            Filesize

            2.0MB

            MD5

            5c9e996ee95437c15b8d312932e72529

            SHA1

            eb174c76a8759f4b85765fa24d751846f4a2d2ef

            SHA256

            0eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55

            SHA512

            935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b

          • C:\Windows\Temp\955927.exe

            Filesize

            13.1MB

            MD5

            bfe6b13011bbba05c28109cf6730f8a1

            SHA1

            28da37544341c3587c11c1f1f294505516434d40

            SHA256

            93fc509fc9fad8d0191ceb7fe43ae7be1ed176862eacf0f905120257b15ecbdd

            SHA512

            d717859dd8b04832588e9ada5f83a8e2953c6214364a189b1b731212a5d4cdd1ac441646339efc9484b38a49d518d70f09624028e0a12921d7f2778fd9982660

          • C:\Windows\Temp\cudart64_101.dll

            Filesize

            398KB

            MD5

            1d7955354884a9058e89bb8ea34415c9

            SHA1

            62c046984afd51877ecadad1eca209fda74c8cb1

            SHA256

            111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e

            SHA512

            7eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2

          • C:\Windows\Temp\curjob.bin

            Filesize

            40B

            MD5

            35b9e9e6454dedaf2a8214d6ab2733c3

            SHA1

            6e257cc8dcebe0a21ca72d95c5701d862ed7b3a9

            SHA256

            620bf426190c1e3a0ba6aa5b895d4a66d79d4f52159c297132bb7abc2afbf4ee

            SHA512

            720ddf7a45b8e01cf682f6d91d747e42006c7eb6c4a879d347e95367502eddffeb32b1331513f7b3fec2b4430f38b56d5cf1e88d77c6269ceb12d6c584e2bae0