Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 10:41

General

  • Target

    4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.exe

  • Size

    6.9MB

  • MD5

    7c13002e597cb5656e8e7a0e3cf40eee

  • SHA1

    af5de2a83f683cf0f03c672ae4f2414d3ab5d184

  • SHA256

    4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16

  • SHA512

    5b5c01a9ad232d7b3349a482a26ffb4778bb2e375eecb41a7e2bcf66498e4c2355add582ba76d165d4e07da4aa160cc31bd4f9fb9e68ce02c98a9c201524aed5

  • SSDEEP

    196608:0H/2cOhoGEpX+jRFRvz29jgM7+3Utny3r/mvZO0agzj:5cOhoGE1ArRvqlgM7xtAT0Hzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.exe
    "C:\Users\Admin\AppData\Local\Temp\4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\is-C8VEQ.tmp\4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-C8VEQ.tmp\4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.tmp" /SL5="$501DC,6982471,68096,C:\Users\Admin\AppData\Local\Temp\4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:880
        • C:\Program Files (x86)\WMAFormat\wmaformat.exe
          "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
          3⤵
          • Executes dropped EXE
          PID:5012
        • C:\Program Files (x86)\WMAFormat\wmaformat.exe
          "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
          3⤵
          • Executes dropped EXE
          PID:3244
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1452
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:772

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              139KB

              MD5

              cdcc9549dbebbd2ea6d87295bea27f29

              SHA1

              e628ea26c0faeab31fdf3c54524b70ed89c27429

              SHA256

              66325b6b6776fd8f0671593521d740083f7ca10ca5dce4331e42025cc6233b29

              SHA512

              61d1c8f2e1a31d5c8c9fd91a1c691f89654b81f8d846edc258da8f0f68c3038bcfab8b3b12f354ecf03597b14fa5c746328a5548ec68f9f5862e397959ecfe08

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              93KB

              MD5

              fb3b4e23feb8ff6d4b4291c99756bd0d

              SHA1

              a3c28752697ed5cbdaeeb385f63410b5ea9cbfab

              SHA256

              02f52ad43eaca0fb8010688196cd81858c57dfe26fd0f89a7288a3ae20183d29

              SHA512

              ee7d2066e43b14e87d92a75c548982c5fa52405ffa4570985f619b881c07b4ce1ef6619a8c6766915f697e4ae4352ce0286c7c7f87e3dae72a194fc17c4ab0f0

            • C:\Program Files (x86)\WMAFormat\wmaformat.exe

              Filesize

              310KB

              MD5

              1485d57a3f5d943415c15e2f91670661

              SHA1

              f5a9717bffe3fa70295b1b7b21cf97093f352101

              SHA256

              7fd4ac9fff067e86289d6e57b87f225029281e692e77bd4d29cd776b95ba9177

              SHA512

              2a27f7964c5dc08155346f21183f7d1483b905551891f263cf94c1e2703f11f101040c43213b17a27bf0ac7928555998361d73dbe3d7c736ba28c72afbc03880

            • C:\Users\Admin\AppData\Local\Temp\is-C8VEQ.tmp\4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.tmp

              Filesize

              14KB

              MD5

              eb7d65233a7d18d07c0975dd589ff62b

              SHA1

              6531f6e6b8278c247654e9dc4093b790873e3683

              SHA256

              eef63891e861b01bbf4819d2fc33cfffd43b2eb35914165ab6f981e76560b37d

              SHA512

              3140c0213d470d44f1dbb2d08524221183d769ce53124f8c04b8af4c90edcf64294764c819f39eab28f5c36fa3cb1b91138fcdaef21e9875b5a13a13b0301cae

            • C:\Users\Admin\AppData\Local\Temp\is-C8VEQ.tmp\4d965f743f07b7ee0968e114f76c7d8d522a60f66950529e4f2c99d723beeb16.tmp

              Filesize

              37KB

              MD5

              d1165adcc98a72e83c5d2716a4ed1e70

              SHA1

              fff4b90d2b4ac67ef0bc71edaf6027bd77fa0335

              SHA256

              eeb7f09e9f089d1f36f762d419e9ff1da7b965a712fb0950a8baeca88953d83e

              SHA512

              9541ef968d7c85ba5455cc1c096177c2e22e26444d18de15fe9e39740c0df51df1cd856a79f01f65d5dec3df3068956493b834efe55435ad82b8593aa147e2e6

            • C:\Users\Admin\AppData\Local\Temp\is-MC7PC.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • C:\Users\Admin\AppData\Local\Temp\is-MC7PC.tmp\_isetup\_isdecmp.dll

              Filesize

              19KB

              MD5

              3adaa386b671c2df3bae5b39dc093008

              SHA1

              067cf95fbdb922d81db58432c46930f86d23dded

              SHA256

              71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

              SHA512

              bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

            • memory/1636-163-0x0000000002240000-0x0000000002241000-memory.dmp

              Filesize

              4KB

            • memory/1636-10-0x0000000002240000-0x0000000002241000-memory.dmp

              Filesize

              4KB

            • memory/1636-161-0x0000000000400000-0x00000000004BC000-memory.dmp

              Filesize

              752KB

            • memory/3244-185-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-189-0x0000000000770000-0x000000000080E000-memory.dmp

              Filesize

              632KB

            • memory/3244-208-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-205-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-157-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-159-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-202-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-198-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-162-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-195-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-166-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-167-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-170-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-173-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-176-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-179-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-180-0x0000000000770000-0x000000000080E000-memory.dmp

              Filesize

              632KB

            • memory/3244-192-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3244-188-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/3932-0-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/3932-2-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/3932-160-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/5012-154-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/5012-151-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/5012-152-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB

            • memory/5012-155-0x0000000000400000-0x00000000005CF000-memory.dmp

              Filesize

              1.8MB