Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 06:10

General

  • Target

    3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe

  • Size

    6.9MB

  • MD5

    5745044a16eceed73253ae2449880cac

  • SHA1

    9cb5883afaefbcea92ed5fd63050c4a2be3a680f

  • SHA256

    3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2

  • SHA512

    fdd99c627fef48b6d8477449c6d6316e4d3a022aebd3ccb4c36b85281926f73e096d4db5fc908041caff77a24d67684cb7013f738d8a15079c16db17dff9b297

  • SSDEEP

    196608:jH/2cOhoGEpX+jRFRvz29jgM7+3Utny3r/mvZO0agzj:acOhoGE1ArRvqlgM7xtAT0Hzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe
    "C:\Users\Admin\AppData\Local\Temp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp" /SL5="$90058,6982471,68096,C:\Users\Admin\AppData\Local\Temp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
        3⤵
        • Executes dropped EXE
        PID:2724
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:5052
        • C:\Program Files (x86)\WMAFormat\wmaformat.exe
          "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4388
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3764
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:4852

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        75KB

        MD5

        d8c92026448d6385831f875d0faff218

        SHA1

        eac98f4dbf8543e22800b3300da2b4a181c32a1a

        SHA256

        522fbc56005609159179717da3fc515a3e12780f478ba4d919023f0131234c3b

        SHA512

        e3adc2887670e1e5bcd9e93f654efa56539163194f144c4d0c2c62b42d50f26ea38eeaf4fc22427cde08a8b6e63b8b1d7914139a8e4ddbf7dd7c73be22019d3e

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        56KB

        MD5

        ad8e8b7e30c6f4b546746bfb91c5426c

        SHA1

        d8192269cbdc0394fa8f750d03716c654bcf309d

        SHA256

        0782d91ad51f7fa71491660f9e3f369cc2ed823eae147b67570a44d613aefee2

        SHA512

        ff16fc981ff5f7f494851bf5b799206f819fc7e08a5f8cc40632cfd52cad6834dcb3f73ab98cca7b8c9b600f190e64a0e1ab16ec89009d504aa132a73bd7bbf0

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        43KB

        MD5

        f85df30a11fab67d32e44b70f81c22b8

        SHA1

        3847ecde60760015b5af4474cbd9d63959479a28

        SHA256

        0949b9a54979b8b28ddf70d06a50a2513fe385e6844717a9dddcdebe61dce195

        SHA512

        add8b50354484bfffabfa8a55a7cc05f7a0d623c0ad85b676b2419d5218ac1a62596a7f7654d28debafb7372beda3e24473aab491c06eccfdc1a7ab0856a7648

      • C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp

        Filesize

        618KB

        MD5

        aac1a0db045a8ae9209a0fa40e1efa15

        SHA1

        d8db98f9331f116d862f080a0584246d68349f5f

        SHA256

        331a30d42e9b864fb831654d2ce1b687981e74feed9162aa8593778b350a3b0a

        SHA512

        0f65ed93db26bc51375e152875bc38185e3680e4826e3ed85dd29af65277525567f0c58c53b8e70f639110ca8ef95165d4bda640f3c25308740ebe74bb0150fd

      • C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp

        Filesize

        616KB

        MD5

        e976ab05312d09ebaeaad90457032e16

        SHA1

        b0f44fa09a422e5296b6d8694e9c0b38352e9be8

        SHA256

        73cebe1a3c0712e598a22791efaf488caa753ae56a6c9043940a48d05bf20553

        SHA512

        a0e9591df236e800d60e91bf3470e192f9a9c9afb17d3dd81c2d3d4eaf5bbcadfa81d4df2fee346939fd815ca3a086b78e585a2f0b084bdd3e60f9cd97a7e9c3

      • C:\Users\Admin\AppData\Local\Temp\is-OUIOR.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-OUIOR.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/1300-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1300-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1300-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1316-7-0x0000000002100000-0x0000000002101000-memory.dmp

        Filesize

        4KB

      • memory/1316-163-0x0000000002100000-0x0000000002101000-memory.dmp

        Filesize

        4KB

      • memory/1316-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/2724-150-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/2724-155-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/2724-152-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-179-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-181-0x00000000008D0000-0x000000000096E000-memory.dmp

        Filesize

        632KB

      • memory/4388-157-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-166-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-167-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-170-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-173-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-176-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-159-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-162-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-186-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-189-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-190-0x00000000008D0000-0x000000000096E000-memory.dmp

        Filesize

        632KB

      • memory/4388-193-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-196-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-199-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-203-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-206-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4388-209-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB