Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe
Resource
win10-20231020-en
General
-
Target
4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe
-
Size
6.9MB
-
MD5
34603e7aabfb61f3a3ca24a5763a2edb
-
SHA1
3c742b7780f8e83d98729a3461034b98ed592bb8
-
SHA256
4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b
-
SHA512
f7ccf1abb0d1fba3c203a7815245ecd30950506fa320ddfadf628f153bbf50fa990f68f018b7105ec2552410836f842a215a1456c8dc6ab35609736769b94aeb
-
SSDEEP
196608:FRW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:FQeqbhPK4DFY4CtOUYVfzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 4488 wmaformat.exe 5004 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4M8VM.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-EC4A5.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-4DIM0.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5N6VO.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4U3D2.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IV0GQ.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-EV9QR.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QGD22.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-N4PV3.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VVRQN.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-HI59F.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JECHE.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TNDP2.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6NEKM.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-M1R2A.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S3JRF.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CHJH5.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1QIDE.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4Q88O.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-2QL7L.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ABPRK.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NF5VG.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8PTOM.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-QE10H.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-QL44V.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T143O.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-I8TKC.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9PG82.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BUCP6.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IIL5D.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AMQK2.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CCGO8.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8HIQU.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HVV4I.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ET1BI.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FRUUU.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-UNLAS.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-U92DN.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3AVI8.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-767AD.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0DGTI.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3T24J.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3RQ19.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-52PK2.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VM7A6.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SEJUG.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7RCVF.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-08RD7.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3H57C.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2U1CK.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AQN58.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-L4KFF.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-H9VB8.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E1JP8.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-R18DU.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3K55A.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6PT9B.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\is-3LPDM.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-C6QKF.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-60LF6.tmp 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3116 4824 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe 23 PID 4824 wrote to memory of 3116 4824 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe 23 PID 4824 wrote to memory of 3116 4824 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe 23 PID 3116 wrote to memory of 2540 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 63 PID 3116 wrote to memory of 2540 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 63 PID 3116 wrote to memory of 2540 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 63 PID 3116 wrote to memory of 4488 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 64 PID 3116 wrote to memory of 4488 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 64 PID 3116 wrote to memory of 4488 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 64 PID 3116 wrote to memory of 740 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 68 PID 3116 wrote to memory of 740 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 68 PID 3116 wrote to memory of 740 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 68 PID 3116 wrote to memory of 5004 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 67 PID 3116 wrote to memory of 5004 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 67 PID 3116 wrote to memory of 5004 3116 4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp 67 PID 740 wrote to memory of 2304 740 net.exe 65 PID 740 wrote to memory of 2304 740 net.exe 65 PID 740 wrote to memory of 2304 740 net.exe 65
Processes
-
C:\Users\Admin\AppData\Local\Temp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe"C:\Users\Admin\AppData\Local\Temp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp"C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp" /SL5="$5021C,6953145,68096,C:\Users\Admin\AppData\Local\Temp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2540
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:4488
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:5004
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:740
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 111⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD50075cbbce5ee78bceac4f732d811903b
SHA1959a1414f427d36411edbdb8c9be2a958572e9e0
SHA2567374896e95587cfb37120df16520c81a6aa64d40f22256cbd764d713e5f4b9b4
SHA5121752408f24706af1a271ec53aa3a79662933ba242061c1af8fc1a7a58257a1a1372aa705ce732d0244f07ede717837c85cf7d6d8f7645a6f19d8662d43554fc3
-
Filesize
29KB
MD5c6d53b5e079be9966434e8777f172821
SHA1d152f6e46af02cb21e5bf7eb10e3cae9b3b0220a
SHA256410ddc51c278497f221f55ee9344d747a03a1c1caa965d3ab452aaa4203cb2f9
SHA512e703d6ac4c12eaf9ae875118566d4d77ccc26879133db59eb86ab284d3fd22cdc8179225486337ae708aba9ddf60dad39ef115816e60552beca887ccbe6e3b87
-
Filesize
86KB
MD5f5a3616f93e09984833c514f4a2c6c4b
SHA15a695627d27b9174299d76ea49c33ec99866c017
SHA256e948c375fd59c875951a84163fadb27883b47a3afb25f0c837b3597af6873704
SHA51224b251d2d995e87f7c4369e62f15e72f0ead678740ebf9227a822c126ba44c8aa212071114ea412133b84eeba9c6b8817ab0a157d51fa386cb81a601dfd31d14
-
C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp
Filesize39KB
MD5e895de0eaaf5f099769d32f6494a0b26
SHA1492f0da2fc06246f4f8435ae527f48fb4fb90477
SHA256f8a9cdfd9b5d80a7d5fd3fd77a078d57b4004bf033ca7c8543c96d43919d9a19
SHA5129f1c0ba543eb68ee64b8e623c589eb635b3ccba79b6d99577abb35b1c4df0396fd6388c51f9acd2d9379f4bbb9918de1b841698759cdb179efb66651b4ecd244
-
C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp
Filesize114KB
MD5491510df3150da37ddb774b76ea10bf3
SHA100bcc89728cf8eb3841d5098a65381652732b92a
SHA256311cd0174461c73477632133c83d2c28769360a078d4ddba277ff025cb84eb8d
SHA512fc7de40a6f603dd19d87afb06155ddbf05f0f3001d841a3244ab59504f752ac8d75f5a204e3d83de2d0342731a56df3f72cf15c0c30a0166ed1b2cfa0cdf02e8
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303