Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 08:15

General

  • Target

    09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.exe

  • Size

    6.9MB

  • MD5

    0159c5e89e04e50c79debf609f5bddb9

  • SHA1

    3fe73bfc57cac5b663c50f6d1a6e215509c44051

  • SHA256

    09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62

  • SHA512

    0de3ae521b6c20e060cf5b1e6419cd65b5e3bb65133a402a9205e6f6128f8a9a83385400ad0f432205a505f3eb0a2af817efbb9c1e26a7a537590341c173893e

  • SSDEEP

    196608:tyD4UUAnfcrSuleVp+jatZRGrrC/sF5wvACzj:o4Uvfc2RGatZcXF5uzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.exe
    "C:\Users\Admin\AppData\Local\Temp\09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\is-SN6JV.tmp\09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SN6JV.tmp\09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.tmp" /SL5="$70220,6986290,68096,C:\Users\Admin\AppData\Local\Temp\09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
        3⤵
        • Executes dropped EXE
        PID:936
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4372
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4548
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:3804
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:5004

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        37KB

        MD5

        6c58ecbca88163deae8985211ad5071e

        SHA1

        48211313909f481aeddf9c68382f836225e6f66b

        SHA256

        fa96fef0dfed7c33065048ab0a8dc90d3a0e5674e156843e2b5d78b92fa054c2

        SHA512

        7897472d47a225145e5e207079be3dfb2eed2a36d42423a3689def0fe387be890bda3a1a1f0413c3b1fc1c0d13e6e03bbefba26c4ee159b97a70ef5c7df5b94b

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        57KB

        MD5

        b22f55fa010662eee5bb6b46ec4481ee

        SHA1

        a19f0736ee69a53628656dbd56139b52a7429bbd

        SHA256

        b3d97b0f5c5d33294666a65605d277f92d83062ae1d800adf7e5e4673812a1f0

        SHA512

        5b9e2e12952794891c4b707714a7288f250f7ccbbfcf066de9a523c1b9f3b989b8c8afe6a7c6938c6f55db623bad681dc31c8031a4d81cd1dc67fa568448f044

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        77KB

        MD5

        b18f59246ed053c622b7fde783c2e24b

        SHA1

        8b8568eb61731db8fd7ae915136b1ee16483c22c

        SHA256

        ac6e96f095bb2d08d4ab1b4ee99d47d90ed1aded9b74faa062dacc2ee3c8120c

        SHA512

        e42f13e0113ca1b58dae7b7b2c4baec857775c1eae2853d80072ab5892e317740c55250531bcc4a42b46d14839738ea7e7aef8d61904e82d103de4408e657fdc

      • C:\Users\Admin\AppData\Local\Temp\is-SN6JV.tmp\09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.tmp

        Filesize

        206KB

        MD5

        689f4a6c3f2b93fd06ce0251d760b884

        SHA1

        4fc45a86c67ac6ea319c827e56bd4058a106bf0d

        SHA256

        06333acd235989818688b938106501c86850857282ab7a1973de7925fce109d4

        SHA512

        c6f9522136ac78805a983d35ca473975f49870cc550da470652b8776974833367cc37849703c2f52b5475e30657844ed8125f2ab384ec96ff223a8fb6d0debb2

      • C:\Users\Admin\AppData\Local\Temp\is-SN6JV.tmp\09dc984d7b44ff75be78c5243f6f8239a636e378eee1a7f9c3112985c2ddfb62.tmp

        Filesize

        347KB

        MD5

        19587528a3ac6f44c9b3a43d988a24aa

        SHA1

        154983b8a2f724b49aab8cbd6fd0aa3189181e59

        SHA256

        a6fbe6215d50234c23cf40aff77b834a2173bea74384f79f342ab9067fce4f7b

        SHA512

        810d8ff7ce9cbcf9fbbbbbeff6ebef3e4a5e786ed0ca22f56d5e6f2c5f2e7dcb59e47d672a7fde506026dda95fe1222b563664580eeb547267b6b4c9b31f2da2

      • \Users\Admin\AppData\Local\Temp\is-R3MRJ.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-R3MRJ.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/936-182-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-189-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-209-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-157-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-159-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-206-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-202-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-199-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-196-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-193-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-190-0x00000000006D0000-0x000000000076E000-memory.dmp

        Filesize

        632KB

      • memory/936-162-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-186-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-166-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-167-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-170-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-173-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-176-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/936-177-0x00000000006D0000-0x000000000076E000-memory.dmp

        Filesize

        632KB

      • memory/936-183-0x00000000006D0000-0x000000000076E000-memory.dmp

        Filesize

        632KB

      • memory/1308-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1308-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1308-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2892-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2892-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/2892-12-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4548-152-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4548-151-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4548-154-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4548-155-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB