Analysis
-
max time kernel
1s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 05:20
Static task
static1
Behavioral task
behavioral1
Sample
35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe
Resource
win10v2004-20231130-en
General
-
Target
35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe
-
Size
6.9MB
-
MD5
931053a56d2b3ddee3555a15eba98069
-
SHA1
d655cf9fef1c118806c4943bb53f5be34d2c6804
-
SHA256
35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43
-
SHA512
69b9b2c6ed8695770e620ca909a5755b0c32b333edefb60fccd3a48c7d31fd0d5f68d948416ddae802b6aae090cd1f24a7c980403a43fa2453c39005b5a6324f
-
SSDEEP
196608:vRW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:vQeqbhPK4DFY4CtOUYVfzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 836 wmaformat.exe 4068 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\stuff\is-ML5IH.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-2ISGQ.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TT61K.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-03N8R.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-32BPP.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3FJTS.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-79DV1.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JMC6I.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-F0034.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BVMMS.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-06VBD.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3EODC.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-IPFAT.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FCP4H.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9JIG0.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-T7U1I.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2UO7O.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-N9IOT.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-EHIKG.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PI3AF.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NV43R.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FSHDR.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VBCN5.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-N8U4A.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2IJS7.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-R6IFG.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4CSLL.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8QJMC.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-350HF.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-8LATL.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BS95L.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ODKAA.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HFAL6.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9M0I1.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-KPQQU.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-I6SUS.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AN0NC.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-17U59.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\is-MGS3Q.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-EU5OE.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CQ6KC.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OO96N.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KFS31.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9BR8U.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3U8RR.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PKNJH.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2VDF2.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KQFUE.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RAOIS.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-L2FEH.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G0GTU.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-97VAP.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T3MB2.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VOLN0.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JD28V.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8B5MP.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ALUMQ.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-Q22M3.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BF16Q.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BODG0.tmp 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1136 3532 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe 19 PID 3532 wrote to memory of 1136 3532 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe 19 PID 3532 wrote to memory of 1136 3532 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe 19 PID 1136 wrote to memory of 4688 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 41 PID 1136 wrote to memory of 4688 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 41 PID 1136 wrote to memory of 4688 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 41 PID 1136 wrote to memory of 836 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 39 PID 1136 wrote to memory of 836 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 39 PID 1136 wrote to memory of 836 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 39 PID 1136 wrote to memory of 5016 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 38 PID 1136 wrote to memory of 5016 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 38 PID 1136 wrote to memory of 5016 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 38 PID 1136 wrote to memory of 4068 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 35 PID 1136 wrote to memory of 4068 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 35 PID 1136 wrote to memory of 4068 1136 35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe"C:\Users\Admin\AppData\Local\Temp\35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\is-2T2A0.tmp\35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp"C:\Users\Admin\AppData\Local\Temp\is-2T2A0.tmp\35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp" /SL5="$A002E,6953145,68096,C:\Users\Admin\AppData\Local\Temp\35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:4068
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵PID:5016
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:836
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:4688
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 111⤵PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD54c73153365e741736a954d99e002a501
SHA11cef929810681525c062594cda8a9ab7c00e6727
SHA256f8f3a14933a15d4a893fefe84bd84781e14411b71fe255fe2b2d6df758178840
SHA51239fc6a0658f92b173f16cfceaf9f0bd6d24b8472443834170a4583358c458d73fb82b5859c94724068ed000cb9b22661dcfc59ab4ad9c318b14245dfdfd3167e
-
Filesize
12KB
MD5b76bee06b0c98890af07078c5e710906
SHA1a557b3008bda19659288e0bae8fde5cacaee9ec6
SHA256b95525faee73d64b2f7536615e8c14c59b7c0cca2886c0afccc48d04b4d3f910
SHA51285574dab057d6258cfce6ecb68e7a7c2b030f9dd0146da0f2c541f8b82a9d8d18848a366063e5bf7b1e2bd1246330528043d5d86dca681db9d1ed1ee13f41568
-
C:\Users\Admin\AppData\Local\Temp\is-2T2A0.tmp\35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp
Filesize32KB
MD53002aefcd31dd9875a40c2c07346a3ec
SHA1fa431ed89d68eefe59a006ad23e7f94f1860427f
SHA256570d3240a4c9abccf0b56aaaddf85eaab3b119c65f6af20f53dd741d150e92f6
SHA5122bff77f4ecc67121a50510f2bc202b7f04084b6ca22e24b07e1d191c261e4372cee0d32cbcce2d591e181d4ecc4879fd214d9dcc6ae0f424efb226802aa42d39
-
C:\Users\Admin\AppData\Local\Temp\is-2T2A0.tmp\35473667c63ac9fdc76321f898ac9bcf320d74feb33dc05869ca17f6e5ceab43.tmp
Filesize6KB
MD5138153adcaae78149fafc952a5620b23
SHA11de86559f4552ec3ae1b0064dc41d12971b46779
SHA2565fba8b8e5d0d348d3ec8f219b6117004d78842c4d5750c917434e200cb2306ba
SHA51249af4048915de7c2466cdcacadd43b3960ca5ad7d272acc554ec3fda256c60db1365fdbd5e11e00126c8619aadfa3c712f3175f7f326d803e860c0cb4bdef09b
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
1KB
MD5db6184777f072d8f3d28804aa99da162
SHA1b62f98de6ac12318bb03da9a5329dc7930a474b4
SHA25604d109206044de4c8c52eb3bf17bb335b195f181d7740d18e89b5deb3e0e48cf
SHA512f530c401a202aab567d956a8ea40e76339421408ffbe663672736356e83de4e10992960a644097e4e9f20449be62be9eafa3cde50d6e8c7cd2026c7dde4baec7