Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe
Resource
win10-20231020-en
General
-
Target
0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe
-
Size
6.9MB
-
MD5
eb5e752f6dea4f843d3a66d5034b02da
-
SHA1
04a6bbcb0af57c5417c51259ae09bc5517a02bdb
-
SHA256
0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a
-
SHA512
b72dadd4cfe5639379bf968abbd25f1e480fc8673e7891d4f011b47dfb27b9f9a71df520c6faced1629fa13240ebc14bc6ead6b8b36bcedfb0541b2e8cb2e23b
-
SSDEEP
196608:0yD4UUAnfcrSuleVp+jatZRGrrC/sF5wvACzj:D4Uvfc2RGatZcXF5uzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 3820 wmaformat.exe 3184 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FO5S5.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-07HG1.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SIHDF.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KRVJK.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-69DVE.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-B1NV5.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-VFSLS.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-3PQP8.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-USG1R.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JBKRJ.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-69AP1.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TEJEL.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-DD0SB.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T3R8U.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-UTG2A.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MQMCC.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VDAVR.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5HEGE.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-NETPD.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IP1LG.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PVGUC.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G5C35.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ANDJB.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-A5AF8.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E7ILT.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0KM9R.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8A5FH.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JIL54.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8D8HF.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2HDC4.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CLF5N.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-K08QN.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-32G5B.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BC4A0.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6I3JD.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MVES1.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\is-RQTT3.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NKUL2.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RJ8FN.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-VR7HR.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-32QNH.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9P56L.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4Q88I.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-K7Q16.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-GNINS.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HQ62H.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-75SJS.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8B1EC.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VBL95.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1PUQ6.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JHNLB.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T3RPA.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-M64EK.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-3MRGD.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JOIUT.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7G7E5.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1CGRG.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E3B3O.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AEUMO.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-KD6KO.tmp 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4220 4836 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe 71 PID 4836 wrote to memory of 4220 4836 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe 71 PID 4836 wrote to memory of 4220 4836 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe 71 PID 4220 wrote to memory of 2728 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 72 PID 4220 wrote to memory of 2728 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 72 PID 4220 wrote to memory of 2728 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 72 PID 4220 wrote to memory of 3820 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 73 PID 4220 wrote to memory of 3820 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 73 PID 4220 wrote to memory of 3820 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 73 PID 4220 wrote to memory of 4224 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 77 PID 4220 wrote to memory of 4224 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 77 PID 4220 wrote to memory of 4224 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 77 PID 4220 wrote to memory of 3184 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 76 PID 4220 wrote to memory of 3184 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 76 PID 4220 wrote to memory of 3184 4220 0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp 76 PID 4224 wrote to memory of 4252 4224 net.exe 78 PID 4224 wrote to memory of 4252 4224 net.exe 78 PID 4224 wrote to memory of 4252 4224 net.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe"C:\Users\Admin\AppData\Local\Temp\0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\is-57VPH.tmp\0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp"C:\Users\Admin\AppData\Local\Temp\is-57VPH.tmp\0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp" /SL5="$80206,6986290,68096,C:\Users\Admin\AppData\Local\Temp\0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2728
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:3820
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:3184
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 114⤵PID:4252
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5123f64478f68cb97165e667113136d0e
SHA18f1e2bd778d7cd5baab3962f60c35a054df5fc53
SHA256e73ae73d65e9358fa396290b83ef64347791ef6ebc601b3e81860191c4679126
SHA51275d53094ee8fd798232c3b7b7f39c2a8869c5974fc6c27ebc369eff8cf832da0d113ac50807abb1974e38721ba7441b1994663438248da330ac705861d0ab5a8
-
Filesize
544KB
MD542d84fa62662951bb8ce7b7f1f1d6eaa
SHA178651c5cac2d555b87dfb3662f716052e482eeb2
SHA256a29bc5d6b3e1bea7929c9c4d9f7cc2a22676fc9f79c10087b0635ad693112171
SHA51291cc423bbe0cefea11f0f3ad16bc756ae3e67756e1daa96eefbc0a3c87d88d702f5bbb8e6dcceeb0ace6855f256a259130e07dbb3675f79e0cde1a6f245fe8bf
-
Filesize
77KB
MD59a572cc6bfe32bc30083f71f461c12a8
SHA17c9892bd65db266b34aa96da2facc90d8a2842dd
SHA2566bc8671c32506398bf708280bc75e654fd332dfe79827d5ca3a68c2c980af514
SHA512d2e4b45ce04b495a78bbf56e40f6e45b1a0c85e38ed80b61175b4adde5b4adca99c5d1f2736253c322c7bbd17bf1833434b8f1e0fcd44ec4e1fb848fd6e57240
-
C:\Users\Admin\AppData\Local\Temp\is-57VPH.tmp\0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp
Filesize678KB
MD5b051d74b5b3f4f502e90c7a098227e43
SHA1af724b2d469ef54552791379fc61542c0242f2de
SHA256b087937eb80ae238d6e10e9f9adac3e1c439c120e52832c4cddfc4e5db181935
SHA51226bc59fd6e48c78df31bd5aa467d8ff39b20cbc345280f1dc2c29eeffe1eacb44539365db1c9b3cc33597061405a644afeccd19a611598c4e303cca8ac7408c0
-
C:\Users\Admin\AppData\Local\Temp\is-57VPH.tmp\0c321aab35f4220cf166ca7621034caf5d6b51eade54216004a9505545293b6a.tmp
Filesize563KB
MD5e6ca10504d7ce9b617437ee11300852f
SHA177ff8e9559f7ea9a7a72321f8d99716ec30a2e32
SHA25651b17579bd8abd79b9c1154b5b7ebda1a08be2f6015c189939654947cbbfd33f
SHA512bdd68681e5fe00bfec855e6dab9bba422988c76b91c3625768d5f9a32d391c069a081e8e7a504e0664bff6f22db7896d1234775ed47b95facfa8154499db2a8c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303