Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 07:31

General

  • Target

    6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.exe

  • Size

    6.9MB

  • MD5

    7f1faaa34f804a897e57f7478e69fdd7

  • SHA1

    7ee69e7d82deb4c2a179cc1ef3db9d974a7984de

  • SHA256

    6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0

  • SHA512

    4fb5f285cecdb1bb2b985e7d10888e66f810dc1947de435ca685cfd905068ef45245b017fbafebfd29442d7bf58282bf13de69da6fa601bb8f69ac5e27e89d44

  • SSDEEP

    98304:3CtQAsI29jHcxWjRTp6azZzB8hi4ZoEiAmP+xhctqd60dVADjhSF1O8lw3kBL7l7:kstjRJ/4ZoSQQhtd6sWDlSrM0BLRrzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.exe
    "C:\Users\Admin\AppData\Local\Temp\6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\is-0VHC0.tmp\6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0VHC0.tmp\6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.tmp" /SL5="$601D2,6990075,68096,C:\Users\Admin\AppData\Local\Temp\6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2984
        • C:\Program Files (x86)\WMAFormat\wmaformat.exe
          "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
          3⤵
          • Executes dropped EXE
          PID:4356
        • C:\Program Files (x86)\WMAFormat\wmaformat.exe
          "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
          3⤵
          • Executes dropped EXE
          PID:3488
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4372
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:2192
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:3472
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:428

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\WMAFormat\wmaformat.exe

                Filesize

                1.3MB

                MD5

                0dca7a8dfc92ad4344b7a7a7f2b5647a

                SHA1

                0ff1d72212e20caa4b12654bee999dd1c7896820

                SHA256

                7ccaf1d167691d97c60a28c860b1e6e0dad747546f112656a8e57ad82d72216e

                SHA512

                8c1d776b124a467c66b411ae0b52c7101676164d285f2f90496d0a3d871e6079f374b85957f84071a2be1db93142b3feca4f2b952153db326c37e2e493cb6baa

              • C:\Program Files (x86)\WMAFormat\wmaformat.exe

                Filesize

                638KB

                MD5

                e0ddab143713bb81f830aa8ea827ccc4

                SHA1

                ad147948411e0bb5b121b35730ba8da32a1abc9b

                SHA256

                d056062629b32082edc2c4c55fce9d7f1d3d5920036bf3406f47e7e726760b47

                SHA512

                b654a66860e66e04d185d7ff02f18b38d6c1514abf29b368b17bccd67ac8dd9ae139d0530594a213f2698327cfe9095e88951b1faade731fa2fe58960d1380c8

              • C:\Program Files (x86)\WMAFormat\wmaformat.exe

                Filesize

                209KB

                MD5

                8fd60316b1c8273b5c41c9122c559ee4

                SHA1

                406920468e353d82c90193e26d51e0c60ed5fd24

                SHA256

                bafec29c91c45a352a290420901bcc35f3d914625a92f553ea2a714a2a83f25a

                SHA512

                a1c9c283954e57fd98eaf534e290ff284277ed6a82cc310b2a9a79fb1e97fd60410eb4a287b86c19512841d16ada149cf274d77302791e2e399a29ad29f6a528

              • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

                Filesize

                16KB

                MD5

                5950d7678ca59aaa3d4679e8b68751e3

                SHA1

                603768a9e768ab55c03dd3d749e6bb481a3c9d1a

                SHA256

                5a19f0c73cae441055ef02fa59479f4156de26c7c46e2202d40a0dc22984160a

                SHA512

                142da7a9d95d1be627f8dee66294fae6a36ae80b8f61da64dc1557434410d0d2479ae00bf88ddf796c844ec58e2d46dad38bb96d4df90ec3ee2180506e8cdfaa

              • C:\Users\Admin\AppData\Local\Temp\is-0VHC0.tmp\6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.tmp

                Filesize

                64KB

                MD5

                51c33e9596de92f526b0f54fc3f64a98

                SHA1

                ab1389f9a5dfa0b02f5fd7edcee29bf240ba8be6

                SHA256

                f9447f91e7bb104d0f37f1870a388fd7fe359f6b649f1a27fe767e9962fee345

                SHA512

                2ddd4a10853b53201445140d9e17ab0a2a35e0635a76c3cf8ce34dbc8ae7a59bc6ce2306f97a8c88e6dd5ec5da781315c133c363f6c728d5d53585f06df386a5

              • C:\Users\Admin\AppData\Local\Temp\is-0VHC0.tmp\6b48dcd7ebdbbbc6ce131d4e3113918757321aeda1fb0570706777a985d15ca0.tmp

                Filesize

                687KB

                MD5

                f448d7f4b76e5c9c3a4eaff16a8b9b73

                SHA1

                31808f1ffa84c954376975b7cdb0007e6b762488

                SHA256

                7233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49

                SHA512

                f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4

              • C:\Users\Admin\AppData\Local\Temp\is-B71UK.tmp\_isetup\_iscrypt.dll

                Filesize

                2KB

                MD5

                a69559718ab506675e907fe49deb71e9

                SHA1

                bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                SHA256

                2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                SHA512

                e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

              • C:\Users\Admin\AppData\Local\Temp\is-B71UK.tmp\_isetup\_isdecmp.dll

                Filesize

                19KB

                MD5

                3adaa386b671c2df3bae5b39dc093008

                SHA1

                067cf95fbdb922d81db58432c46930f86d23dded

                SHA256

                71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

                SHA512

                bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

              • memory/428-209-0x000002C731D40000-0x000002C731D50000-memory.dmp

                Filesize

                64KB

              • memory/1720-2-0x0000000000400000-0x0000000000418000-memory.dmp

                Filesize

                96KB

              • memory/1720-0-0x0000000000400000-0x0000000000418000-memory.dmp

                Filesize

                96KB

              • memory/1720-159-0x0000000000400000-0x0000000000418000-memory.dmp

                Filesize

                96KB

              • memory/1920-10-0x0000000002240000-0x0000000002241000-memory.dmp

                Filesize

                4KB

              • memory/1920-160-0x0000000000400000-0x00000000004BC000-memory.dmp

                Filesize

                752KB

              • memory/1920-162-0x0000000002240000-0x0000000002241000-memory.dmp

                Filesize

                4KB

              • memory/3488-189-0x0000000000890000-0x000000000092E000-memory.dmp

                Filesize

                632KB

              • memory/3488-188-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-158-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-165-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-166-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-169-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-172-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-175-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-178-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-180-0x0000000000890000-0x000000000092E000-memory.dmp

                Filesize

                632KB

              • memory/3488-185-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-161-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-208-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-192-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-195-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-198-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-201-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/3488-205-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/4356-155-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/4356-152-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB

              • memory/4356-151-0x0000000000400000-0x00000000005CF000-memory.dmp

                Filesize

                1.8MB