Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 05:50

General

  • Target

    58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.exe

  • Size

    6.9MB

  • MD5

    b9d87c98cd9a45db5fac70856c5fcce4

  • SHA1

    0ac9708756957cb002a8430afa6926cffdf7fc21

  • SHA256

    58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44

  • SHA512

    fe677d2f4163f6d4edbe5659e278cb1de8165d63b93769edcaf6aec68d79c452d9d560e4cc820c7181dc80f7f57808364bca73e35e022f274a7d0ee7b46f1183

  • SSDEEP

    98304:1CtQAsI29jHcxWjRTp6azZzB8hi4ZoEiAmP+xhctqd60dVADjhSF1O8lw3kBL7l7:qstjRJ/4ZoSQQhtd6sWDlSrM0BLRrzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.exe
    "C:\Users\Admin\AppData\Local\Temp\58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\is-FN1L7.tmp\58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-FN1L7.tmp\58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.tmp" /SL5="$701F8,6990075,68096,C:\Users\Admin\AppData\Local\Temp\58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
        3⤵
        • Executes dropped EXE
        PID:2824
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
        3⤵
        • Executes dropped EXE
        PID:196
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4804
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4288
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:1208

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              354KB

              MD5

              8e851723d76c4f4d75d51b17b00f6984

              SHA1

              5b9c10c6b0f2aff6ec14fe6aaa7fa10ea81fd08c

              SHA256

              1f568719c0d0e819ab87419b39baedb0dba6d259a47f6385612651d68b9affe1

              SHA512

              9329f16a2d93042e4af128e1eab8ee0a410b5631790e93be6cb8ffb8aa47cd6d4d7521af170eced5cdee511c99db6d015b00b95d906f58958e14b0f359e42e97

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              328KB

              MD5

              6053290ddfd5d9e8ab2831369915fdd9

              SHA1

              66090c9d59a5f3f710f074b44e12519c92a1f688

              SHA256

              971ac43516f8229dedde0989d8ecea5215b53dacf3f84e47ee7860264dc9cba6

              SHA512

              f8424dec52a1539f24f56bd8b189372c4b38d15bfe98b762b9444574018c4cf87e26ad828209a0692ceb0547658c069fc91cd502d078a58ddca32a022bf8559e

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              204KB

              MD5

              fe70f54f6864c02c615347e1f50ceffe

              SHA1

              3af67804e4c38cc6cc9bd9874e267629493287f0

              SHA256

              afab7e9fcd8b7c521c7cc26301fb081ac4a3212f5d60b0c07afdf275eb88c5ee

              SHA512

              dfd3b4366be613b0c98cbf1434b3543125a4852257f0ce4b9e242e6671cfd42d5379125d28826982e7fa90c61ab1c71548bc0d0127d65ad54efe3f8e2cb0fe6d

            • C:\Users\Admin\AppData\Local\Temp\is-FN1L7.tmp\58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.tmp

              Filesize

              313KB

              MD5

              517beb06b44486b2c8002e36fae9f598

              SHA1

              03fd59f6331c96cd377b52860ffe5fbd8e04fd24

              SHA256

              c5a79ce4126c85ef55b252c233c77d4ee4c69c42e06de3f288fb49eba1d94599

              SHA512

              cd502a672d779854966ea05b7eec9c07dde4dc62de9ea0fe40182c3f7b991664b3c0ef38f6d7eb74d2843a391f6041d4a35cc909faae6713e7dfa496b0222efd

            • C:\Users\Admin\AppData\Local\Temp\is-FN1L7.tmp\58c7c6be118230ff54ef853ba287f469828190cb86954607d418836187faae44.tmp

              Filesize

              483KB

              MD5

              52c013e3abaf824860c303f69419d899

              SHA1

              411dc2c0b10a7834aff4a7fdaf25bab0ca66b27a

              SHA256

              e2dd53ed2096a78bb346e84d3d2c99210cb24b7b8fce7ead3fb8e6a5833ed240

              SHA512

              cb56a1a1df2c4e3a7e144592da2ba46c5718c3241b9a44e24508cb076c535098f22a9ee6b6ae09b32752f2613ac6da16cf1847ec6352e14ff0fa48cfd1ea037f

            • \Users\Admin\AppData\Local\Temp\is-U1DOQ.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-U1DOQ.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/196-162-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-189-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-158-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-209-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-159-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-206-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-203-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-199-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-196-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-193-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-190-0x0000000000800000-0x000000000089E000-memory.dmp

              Filesize

              632KB

            • memory/196-186-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-183-0x0000000000800000-0x000000000089E000-memory.dmp

              Filesize

              632KB

            • memory/196-166-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-167-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-170-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-173-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-176-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/196-177-0x0000000000800000-0x000000000089E000-memory.dmp

              Filesize

              632KB

            • memory/196-182-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2824-155-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2824-152-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2824-154-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/2824-151-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3732-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/3732-13-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/3732-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/4112-160-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4112-2-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/4112-0-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB