Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 04:57

General

  • Target

    4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe

  • Size

    6.9MB

  • MD5

    34603e7aabfb61f3a3ca24a5763a2edb

  • SHA1

    3c742b7780f8e83d98729a3461034b98ed592bb8

  • SHA256

    4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b

  • SHA512

    f7ccf1abb0d1fba3c203a7815245ecd30950506fa320ddfadf628f153bbf50fa990f68f018b7105ec2552410836f842a215a1456c8dc6ab35609736769b94aeb

  • SSDEEP

    196608:FRW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:FQeqbhPK4DFY4CtOUYVfzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe
    "C:\Users\Admin\AppData\Local\Temp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp" /SL5="$5021C,6953145,68096,C:\Users\Admin\AppData\Local\Temp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2540
        • C:\Program Files (x86)\WMAFormat\wmaformat.exe
          "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
          3⤵
          • Executes dropped EXE
          PID:4488
        • C:\Program Files (x86)\WMAFormat\wmaformat.exe
          "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
          3⤵
          • Executes dropped EXE
          PID:5004
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:740
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:2304

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        57KB

        MD5

        0075cbbce5ee78bceac4f732d811903b

        SHA1

        959a1414f427d36411edbdb8c9be2a958572e9e0

        SHA256

        7374896e95587cfb37120df16520c81a6aa64d40f22256cbd764d713e5f4b9b4

        SHA512

        1752408f24706af1a271ec53aa3a79662933ba242061c1af8fc1a7a58257a1a1372aa705ce732d0244f07ede717837c85cf7d6d8f7645a6f19d8662d43554fc3

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        29KB

        MD5

        c6d53b5e079be9966434e8777f172821

        SHA1

        d152f6e46af02cb21e5bf7eb10e3cae9b3b0220a

        SHA256

        410ddc51c278497f221f55ee9344d747a03a1c1caa965d3ab452aaa4203cb2f9

        SHA512

        e703d6ac4c12eaf9ae875118566d4d77ccc26879133db59eb86ab284d3fd22cdc8179225486337ae708aba9ddf60dad39ef115816e60552beca887ccbe6e3b87

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        86KB

        MD5

        f5a3616f93e09984833c514f4a2c6c4b

        SHA1

        5a695627d27b9174299d76ea49c33ec99866c017

        SHA256

        e948c375fd59c875951a84163fadb27883b47a3afb25f0c837b3597af6873704

        SHA512

        24b251d2d995e87f7c4369e62f15e72f0ead678740ebf9227a822c126ba44c8aa212071114ea412133b84eeba9c6b8817ab0a157d51fa386cb81a601dfd31d14

      • C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp

        Filesize

        39KB

        MD5

        e895de0eaaf5f099769d32f6494a0b26

        SHA1

        492f0da2fc06246f4f8435ae527f48fb4fb90477

        SHA256

        f8a9cdfd9b5d80a7d5fd3fd77a078d57b4004bf033ca7c8543c96d43919d9a19

        SHA512

        9f1c0ba543eb68ee64b8e623c589eb635b3ccba79b6d99577abb35b1c4df0396fd6388c51f9acd2d9379f4bbb9918de1b841698759cdb179efb66651b4ecd244

      • C:\Users\Admin\AppData\Local\Temp\is-JCD2H.tmp\4de714ac0d8046b51528dbbe49eb9d3111f0177a04a7c97390735e6a5dda126b.tmp

        Filesize

        114KB

        MD5

        491510df3150da37ddb774b76ea10bf3

        SHA1

        00bcc89728cf8eb3841d5098a65381652732b92a

        SHA256

        311cd0174461c73477632133c83d2c28769360a078d4ddba277ff025cb84eb8d

        SHA512

        fc7de40a6f603dd19d87afb06155ddbf05f0f3001d841a3244ab59504f752ac8d75f5a204e3d83de2d0342731a56df3f72cf15c0c30a0166ed1b2cfa0cdf02e8

      • \Users\Admin\AppData\Local\Temp\is-G159N.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-G159N.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/3116-10-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/3116-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3116-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4488-151-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4488-155-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4488-154-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4488-152-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4824-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4824-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4824-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/5004-162-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-179-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-158-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-166-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-167-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-170-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-173-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-176-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-180-0x00000000009A0000-0x0000000000A3E000-memory.dmp

        Filesize

        632KB

      • memory/5004-159-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-185-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-188-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-189-0x00000000009A0000-0x0000000000A3E000-memory.dmp

        Filesize

        632KB

      • memory/5004-192-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-195-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-198-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-202-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-205-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/5004-208-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB