Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20231129-en -
resource tags
arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system -
submitted
11-12-2023 08:14
Static task
static1
Behavioral task
behavioral1
Sample
ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe
Resource
win10-20231129-en
General
-
Target
ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe
-
Size
6.9MB
-
MD5
80844dba79f40154e96489b7d7f41b69
-
SHA1
8e8808df2a6017c1d779bb3b8b81a36ec5e0b506
-
SHA256
ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d
-
SHA512
66414dd14cc5beae32be0ac1102ee976007c22c204aa2c4f74fba603f57a2fd3502caa7dd194254dba0917e5834ed8833b34b470e367d4b9f4889911a22c9781
-
SSDEEP
196608:LRW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:LQeqbhPK4DFY4CtOUYVfzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 4780 wmaformat.exe 4504 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\stuff\is-JHGD0.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MD9OJ.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QP7R3.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-V8FQ5.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OMAI9.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-GL1C3.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AQCQ9.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2OQH9.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3SO0L.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BGPNO.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LLD5P.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NFCO8.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NP9RT.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S382U.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-992NC.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\is-RP4OB.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IPJ8T.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8QFEF.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E0E8G.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-K373P.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-026I7.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-84TEP.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-EAD8R.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-9UE38.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-U667D.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S55KL.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QGMFF.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-D68A6.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TKCE7.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-A5QT2.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KIQ7G.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G6K6U.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-Q21IF.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RGG8G.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SSH74.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TC0SD.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-0ELRJ.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-NOVJ5.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5EDDB.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6C83Q.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8A7BC.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6S960.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-B6NE5.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TJB9S.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QIB4T.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S427T.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9TPS4.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QLHRJ.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KJ5P3.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-O95O6.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-33S2A.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-7QI8K.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-H2I74.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-GLQVK.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VAU9S.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MOP9J.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G6PRM.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PISN2.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T1A43.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-U8HST.tmp ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1328 2308 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe 74 PID 2308 wrote to memory of 1328 2308 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe 74 PID 2308 wrote to memory of 1328 2308 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe 74 PID 1328 wrote to memory of 2076 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 81 PID 1328 wrote to memory of 2076 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 81 PID 1328 wrote to memory of 2076 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 81 PID 1328 wrote to memory of 4780 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 79 PID 1328 wrote to memory of 4780 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 79 PID 1328 wrote to memory of 4780 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 79 PID 1328 wrote to memory of 3276 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 78 PID 1328 wrote to memory of 3276 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 78 PID 1328 wrote to memory of 3276 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 78 PID 1328 wrote to memory of 4504 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 77 PID 1328 wrote to memory of 4504 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 77 PID 1328 wrote to memory of 4504 1328 ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp 77 PID 3276 wrote to memory of 3400 3276 net.exe 76 PID 3276 wrote to memory of 3400 3276 net.exe 76 PID 3276 wrote to memory of 3400 3276 net.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe"C:\Users\Admin\AppData\Local\Temp\ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\is-B1L11.tmp\ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp"C:\Users\Admin\AppData\Local\Temp\is-B1L11.tmp\ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp" /SL5="$701F2,6953145,68096,C:\Users\Admin\AppData\Local\Temp\ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:4504
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:3276
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:4780
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2076
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 111⤵PID:3400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD59507aced5ecd815006e483d64f79c8c0
SHA1472d2f0eee81e5d322a25895fc3b73b718e90990
SHA256e7865416405c589bf975fba2aff2b472a5876ef1b8abb055ea09ef0baa7a1242
SHA512d7fa3a11372571a407780dfadf8dae608d9d4d36f2c48a40bde7f7d08ed1b3ff7e3a817ab09d63efd6dba343e881b60274b77bf6eb178e44f9457543c698f5a3
-
Filesize
1.0MB
MD5a831b8bd9ecef35a9629a9727fc67e61
SHA1e790d65a90dd97911d0d4fbf7f5180113ec05b46
SHA256d3358fd7a8a93dad9c9d5c4428507b9ba3dc6241c1defb3c9b5ea78dee13bde8
SHA51275d1a58113e131b97832d181beb032a32b85fd4cc586180fa179a7e2d1974ef0fe5e4eee12e95eafde902ed6bea8a2be7616aed201c72c6ae1e3a1018479172c
-
Filesize
348KB
MD5f7ad0d3aa640eecfea6ef16f30cde11d
SHA13e6a8b2a12fc164739c68c1a0f6adf30d441e155
SHA2564631099cee331acc6d496aa8bebce2a1444cc2629bb4dbe37715e15cb75a7ee7
SHA512784c2f8cd15001e782f9485c444e58d577215317118de0887f85ab9a9f15f3484865c29a7d92376fbb5ca28f88617ada706ab76320d8866ca94ad13747c874ea
-
C:\Users\Admin\AppData\Local\Temp\is-B1L11.tmp\ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
C:\Users\Admin\AppData\Local\Temp\is-B1L11.tmp\ad85d176869cf4f22503d7f82815c6dd3447286be3b3eb1238d5df6a9bb0c95d.tmp
Filesize233KB
MD5d05391f45f761ef137c49863b66bf0dc
SHA151a628eddf9828b124ac3fc9481206cd74154dd5
SHA256ffafbddc7cfedfc5ace404407369a0ed4d8e0940f184084deee1c32bc4215155
SHA512d7afa01d364a414bab6ee89c87220f97dfcfc87c3eaf66ce0b92397b3521412b55efaae51b49f310a801b6b24731a5200880d90c1aad7491dced8112aaa5c2d7
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303