Analysis

  • max time kernel
    1s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 05:17

General

  • Target

    b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.exe

  • Size

    6.9MB

  • MD5

    046650864f137fba8d3eb5a30170d5e0

  • SHA1

    ece4ed8d56c8911233fadc17868d7bb93330d633

  • SHA256

    b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e

  • SHA512

    aca9c072c6c56fd663ff60eed8f0464a56881f202df0d296ca3a60cb98ead12ef0dfde44c4518c3660b2e96dd0cf05c95e0f11e9affff7af4e1dc5653a97c22e

  • SSDEEP

    196608:JRW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:JQeqbhPK4DFY4CtOUYVfzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\is-QCN7D.tmp\b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QCN7D.tmp\b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.tmp" /SL5="$B01F8,6953145,68096,C:\Users\Admin\AppData\Local\Temp\b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
        3⤵
        • Executes dropped EXE
        PID:2308
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:796
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
        3⤵
        • Executes dropped EXE
        PID:2248
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:3544
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:428

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              70KB

              MD5

              5490f1a8dedc10cc8dc57ebfe9a8d1ee

              SHA1

              855fe2875043d0405412d92c8902123981293282

              SHA256

              1357e2cf562ec7770b11f9e086ab261daee67610cdbd9a3785958799e5251272

              SHA512

              dc8004c0627407f4fd3174eeb74e69d4e1d3532750bc51a9e15d070c2c813a8990731af20d90cc749296015f2d83e544cd2409df2efae3e19af8abbf5f3b76e4

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              44KB

              MD5

              1f90cf07b6519efaf17e817a0981fa31

              SHA1

              5dd173d3978bcd5df6c7cda80eca79d057a2d298

              SHA256

              40a0fc2780d7779ff80659ae3a2aaa969a5bbf387f9e45fd2f851e9ad0b4459b

              SHA512

              d91b326de8b43516a792608293ea3f135fbeb1d32ca34f238fe333ece3d799d84487cffa7f749902a0a8386a99150143ab12bb563e0d5cbbe425d953e87f1e60

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              39KB

              MD5

              36f05f1442665859ec925b9f07fe1a00

              SHA1

              1ab892b0111d507263fa01708321b55cee972842

              SHA256

              60b2dd20b5cf2b107332809c8d1c3c024b2836a65e8f3037531996d371b5d851

              SHA512

              a22fd139b136a296895ed259586773d16715a5f4ae161180a098b399aa187807ad7c0660476c40743f9c246dae035dee6305e1751eb1cadb11abb4a26212edad

            • C:\Users\Admin\AppData\Local\Temp\is-QCN7D.tmp\b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.tmp

              Filesize

              88KB

              MD5

              1b5e2b84dcdd96e0a876c0948ef44e81

              SHA1

              de75fc2359771ecb82c49ab338bd967af97109c6

              SHA256

              578d97211e086dc72705fb8eeb01c3003177f855795ff5013d7bd7fb4a42712f

              SHA512

              d567dc03472d12f176246c8fb69a4110da2e71b698740e3ff7bc35978dc3046948d1aae87b474a6dbabf1eb6da24c64f2bc717b124b8974bd4e2c07af6b6c25b

            • C:\Users\Admin\AppData\Local\Temp\is-QCN7D.tmp\b7a2d9ca837ce2071e84b9ac425911bc1c6487e050e85da6b1f13b79e5face3e.tmp

              Filesize

              56KB

              MD5

              318db219f30d354aa7c34d4ec943b6a9

              SHA1

              52ae7c9be59fec53977d4b65b01a15135303ddfa

              SHA256

              a79f2773781459967387e95f7240ea4f1141999e6664adf1fd0fbd2b31fee069

              SHA512

              c232657efcb549a2b7b3162941546e686a4fc86658472526501b3c8c6e616eb0c8dad048c5fb984367878a25e2816b483f4e5b8ce63d106d666ccd8767b78fba

            • \Users\Admin\AppData\Local\Temp\is-8N3B0.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-8N3B0.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/1536-162-0x0000000000650000-0x0000000000651000-memory.dmp

              Filesize

              4KB

            • memory/1536-160-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/1536-10-0x0000000000650000-0x0000000000651000-memory.dmp

              Filesize

              4KB

            • memory/2248-151-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2248-154-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2248-152-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-172-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-182-0x0000000000860000-0x00000000008FE000-memory.dmp

              Filesize

              632KB

            • memory/2308-158-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-208-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-161-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-205-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-165-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-166-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-169-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-202-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-175-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-157-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-181-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-176-0x0000000000860000-0x00000000008FE000-memory.dmp

              Filesize

              632KB

            • memory/2308-185-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-188-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-189-0x0000000000860000-0x00000000008FE000-memory.dmp

              Filesize

              632KB

            • memory/2308-192-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-195-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2308-198-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/4960-2-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4960-0-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4960-159-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB