Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20231129-en -
resource tags
arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe
Resource
win10-20231129-en
General
-
Target
4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe
-
Size
6.9MB
-
MD5
2740ebacc1f730837ebf7830a1802ff4
-
SHA1
8737b3585aeda655585b33b0882fa04a81175fca
-
SHA256
4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8
-
SHA512
4d3b0f77ff46968a7d643ef0f506785e324b52ebc258b1edb5d7e0b4b9cf208b6e2a8541cc450bf0db08ae9d984c467db8324e38ba107eaf944a778e60f98ce1
-
SSDEEP
98304:RCtQAsI29jHcxWjRTp6azZzB8hi4ZoEiAmP+xhctqd60dVADjhSF1O8lw3kBL7l7:OstjRJ/4ZoSQQhtd6sWDlSrM0BLRrzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 2692 wmaformat.exe 4332 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-NOSS3.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CA817.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\is-HHVMU.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-UK533.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-B6V56.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VVPMO.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LUNNR.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-I698N.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VV0UK.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FARBH.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MRO2U.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-MRTBL.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FNG6M.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ENUL4.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T1NT0.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-F07LS.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CDTBJ.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BHHO6.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RBCKU.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-1LTT0.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BJJK3.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JMB5H.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JGHGK.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MNFSA.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QMF3H.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-GC5EO.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ORDGA.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3GC3K.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-B0L87.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CCGT9.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ADNKR.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TIK7F.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-V3MUD.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-N3SDT.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-OT0E7.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-007RL.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HIQ54.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-SU4QM.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-D9RVG.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-H85VK.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-BHG0P.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-R9UL8.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RR3KB.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9BE7R.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-M6KL5.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NU912.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-872HC.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E09N3.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T8LIR.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4M19R.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BUU8Q.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RF88M.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-12PSV.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-9DRV5.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E38IF.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-74M1A.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HLBPT.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-D3GTC.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-EIOIU.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FKKTM.tmp 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3448 2404 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe 74 PID 2404 wrote to memory of 3448 2404 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe 74 PID 2404 wrote to memory of 3448 2404 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe 74 PID 3448 wrote to memory of 512 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 75 PID 3448 wrote to memory of 512 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 75 PID 3448 wrote to memory of 512 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 75 PID 3448 wrote to memory of 2692 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 77 PID 3448 wrote to memory of 2692 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 77 PID 3448 wrote to memory of 2692 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 77 PID 3448 wrote to memory of 4644 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 79 PID 3448 wrote to memory of 4644 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 79 PID 3448 wrote to memory of 4644 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 79 PID 3448 wrote to memory of 4332 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 78 PID 3448 wrote to memory of 4332 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 78 PID 3448 wrote to memory of 4332 3448 4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp 78 PID 4644 wrote to memory of 308 4644 net.exe 81 PID 4644 wrote to memory of 308 4644 net.exe 81 PID 4644 wrote to memory of 308 4644 net.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe"C:\Users\Admin\AppData\Local\Temp\4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\is-4GBRV.tmp\4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp"C:\Users\Admin\AppData\Local\Temp\is-4GBRV.tmp\4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp" /SL5="$901EE,6990075,68096,C:\Users\Admin\AppData\Local\Temp\4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:512
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:2692
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:4332
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 114⤵PID:308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5078ae8e133b2d863536c6e063c483d25
SHA1008fb67cc6a3152071841c5d468044bdba6efcc1
SHA25684c9b7d843631cd9ee224b7852dd0e70f190c4884c681480f1b6d774c71dd01e
SHA512b6eb1bd81815ac72b9c0f17341b3c72efdb1014aa75734a98545b39071ca8622ec81f1e6f6a844b05070ca00a2d3dd22c5fa2310fc690fb6ae03eaae0fc8bb15
-
Filesize
949KB
MD5ad8e7a0815a3e081ebdc031bd67026c1
SHA1e4bb2004b8dff1cd995de8b60957afd345c1b07d
SHA2560fa8c781fcc9520356f492ac1d8f52f12e52b36a2d8a2f02ce6cee2d94f98903
SHA512a8ab36745e9c82f172420c831d6b52e58ada89b0d2d216092e94ce39953bdd95392066ffd89f9efc6a5bf64552a810784e8223c5a48575bcaa5bf9267773cae4
-
Filesize
381KB
MD516488f3632f827e05a3c54edc4be31e3
SHA1160ca9be57cff5d5e697663cec375dfe7e8809e3
SHA25691bebbe9a02c687c2f06949f8336303bb659d38bd4f6f9238bd5e74be8a90821
SHA512edc7fa22db74105383a251e39bb015b49ec1847b49a0d96c6ee7f7bf8391f012e34e5df15af918f51ea5524927702ee58dab6054e89acf799cd41b4801b90284
-
C:\Users\Admin\AppData\Local\Temp\is-4GBRV.tmp\4a07b0c8ce0620d7ff1dff042c73c00e7728485d97d6011db4d8c584d9bc03a8.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303