Analysis
-
max time kernel
1s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe
Resource
win10v2004-20231130-en
General
-
Target
c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe
-
Size
6.9MB
-
MD5
6e9efcdd84c48d83d5ec789e3f748814
-
SHA1
ded7f79675673d5e26fd33259f2c067d2abc781f
-
SHA256
c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5
-
SHA512
7d26b19a4009695bbb8d27d04a672b991fa6a0d436982c6d15c11b2f5b2da6e1e3a3d737f7b0cc58d2dfc61cd75644f96b238832df96c4f47903ab8fe898f9a2
-
SSDEEP
98304:/zyQ4kc+v4jvDhsQepuwmrkz216aPE8d9X+X1M2CX27eGqc6hxTGZtsAzFjTidLb:WQ4PTP94zHQ9OX1M2CGjn6hDc6LKEzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 4104 wmaformat.exe 3396 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-FITDU.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AFR9P.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9SC3D.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-00JIU.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FF5FG.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-4ASNS.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IG61C.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-O4IU2.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-B50EM.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7BRIA.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-VKEAC.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8ATIK.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-130J1.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0LVNL.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3MQF6.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HGHQ8.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9PJ7O.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3HTEK.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-81KFR.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SGS0O.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VEISQ.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-47TUE.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4TDNC.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S77F6.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2Q3OC.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-47RID.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2J6VL.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-NDTU7.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KICL3.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QLBIE.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-V5LLM.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-36TPN.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2PJ5D.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-886J8.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AHMF9.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1BBRH.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KJRME.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0O5PO.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SAUME.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-DAMJN.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JIQIH.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HKNKQ.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LTEU5.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-GQQ4B.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8K1JN.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AK668.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3EO3L.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-O1T5R.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\is-5NCSQ.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-C4LQL.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-K69JV.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9AJF3.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-6GGJG.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0T8PQ.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4QBCH.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-R82GD.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-A8PM6.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-NLDO8.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-P6S69.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KEF98.tmp c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1488 3208 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe 20 PID 3208 wrote to memory of 1488 3208 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe 20 PID 3208 wrote to memory of 1488 3208 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe 20 PID 1488 wrote to memory of 2660 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 36 PID 1488 wrote to memory of 2660 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 36 PID 1488 wrote to memory of 2660 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 36 PID 1488 wrote to memory of 4104 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 30 PID 1488 wrote to memory of 4104 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 30 PID 1488 wrote to memory of 4104 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 30 PID 1488 wrote to memory of 1452 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 34 PID 1488 wrote to memory of 1452 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 34 PID 1488 wrote to memory of 1452 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 34 PID 1488 wrote to memory of 3396 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 33 PID 1488 wrote to memory of 3396 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 33 PID 1488 wrote to memory of 3396 1488 c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp 33 PID 1452 wrote to memory of 1804 1452 net.exe 32 PID 1452 wrote to memory of 1804 1452 net.exe 32 PID 1452 wrote to memory of 1804 1452 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe"C:\Users\Admin\AppData\Local\Temp\c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\is-KUTLV.tmp\c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp"C:\Users\Admin\AppData\Local\Temp\is-KUTLV.tmp\c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp" /SL5="$9014C,6985458,68096,C:\Users\Admin\AppData\Local\Temp\c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:4104
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:3396
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:1452
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 111⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-KUTLV.tmp\c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp
Filesize92KB
MD5e23c9ecf69cf8a0d5273f50a61d4c7f1
SHA1add1a0b47b0dcd57fe397abba8a8375478868823
SHA256a1e35c79dcc6d1f50638437e6a36c24a7580a2c293c21c5248cda2b72efc8e3b
SHA512f858e2bef4ea1af4668df5698ddd11d75bde85ff57c24fe009152998fed3a62f47311ba772b1eae3862cb4f54a5f19603dacc75d9e145078dc5f6806608c0720
-
C:\Users\Admin\AppData\Local\Temp\is-KUTLV.tmp\c6bc126fe8d205a4dcdaa9c6f53b4f4d31ff71c99ab481ad0f7f5e157cdc4cc5.tmp
Filesize32KB
MD5242f0974085830509078a1cd4c1f9a94
SHA1367092681411a11ee271521cc4d25aa6f4dab3ec
SHA25646f8a6beae381e68a74abc6e1d81a92533f6e2efd436249fba584b1646c33613
SHA512026f3e1c2f0855cd3beba211f7aba9c2e8621f3e64367fe45a56afeed60f6dec3796e20a9e9273c1eddcd7d546163970a96e7b76041967868cdcbdcb5e0db847