Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20231129-en -
resource tags
arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe
Resource
win10-20231129-en
General
-
Target
b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe
-
Size
6.9MB
-
MD5
a82cf413222c6d0c3c5c2abdb5fcdf79
-
SHA1
3dbed2255a87a60efd9b1afda9497eab290899dd
-
SHA256
b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347
-
SHA512
f3d3656c6e5940f0b965fd05f618d808aa4cdb049f43acca19de361f7cbc4b77d22f787d6fc31c1e39124017b6ac4a3ac046e5c8182e908c8cc44ec241918f4f
-
SSDEEP
196608:7RW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:7QeqbhPK4DFY4CtOUYVfzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 3296 wmaformat.exe 2496 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\bin\x86\is-L55CE.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5T1E4.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G62DA.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8LTF3.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0AOC5.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IKVFP.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PN4OD.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-U6V53.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-M8O3M.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7EMHV.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-DCMBB.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MLO7C.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-Q28I3.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4O825.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7U4GD.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-A5G6O.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RUV1C.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-LQL3V.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3PKND.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7B9UV.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IO33T.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-298B9.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-0LBQC.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0DIVN.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OUGCI.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-R15GP.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MMMU0.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-5PT4K.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0T7B3.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-2C7D4.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-32PM4.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PBL4J.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SAGD6.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-O1DJ4.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ABIBM.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\is-FI1ND.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CH84T.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IDP4L.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-B1RJL.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HTITO.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-U35ET.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-I7TQO.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6A9VC.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-80NCR.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JDBF8.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E01VG.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BC5N4.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-B6ALD.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-9CS80.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-MTTAO.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RJNJP.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8O5GG.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HQ8NK.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9V2MS.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CRP4K.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2IM5P.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-A05S5.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-89JSJ.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-O5RHJ.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-H0C6E.tmp b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3068 1368 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe 74 PID 1368 wrote to memory of 3068 1368 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe 74 PID 1368 wrote to memory of 3068 1368 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe 74 PID 3068 wrote to memory of 3300 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 75 PID 3068 wrote to memory of 3300 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 75 PID 3068 wrote to memory of 3300 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 75 PID 3068 wrote to memory of 3296 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 77 PID 3068 wrote to memory of 3296 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 77 PID 3068 wrote to memory of 3296 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 77 PID 3068 wrote to memory of 1040 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 80 PID 3068 wrote to memory of 1040 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 80 PID 3068 wrote to memory of 1040 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 80 PID 3068 wrote to memory of 2496 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 78 PID 3068 wrote to memory of 2496 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 78 PID 3068 wrote to memory of 2496 3068 b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp 78 PID 1040 wrote to memory of 4548 1040 net.exe 81 PID 1040 wrote to memory of 4548 1040 net.exe 81 PID 1040 wrote to memory of 4548 1040 net.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe"C:\Users\Admin\AppData\Local\Temp\b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\is-SIDQ8.tmp\b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp"C:\Users\Admin\AppData\Local\Temp\is-SIDQ8.tmp\b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp" /SL5="$901EE,6953145,68096,C:\Users\Admin\AppData\Local\Temp\b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:3300
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:3296
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:2496
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 114⤵PID:4548
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5e2cd980d3124377ac723b7f63136eac9
SHA16b6fab652fdefa044f1ded739d18bbde5f166536
SHA2563ff09d95133f39e5e7091c432803e20149da57263318160e3395abc2e695da7e
SHA5125af3b2dccca5f59854c62a7ace01792d7b2eacb027e8fe2fd3e01c13634ee27c48b04ddfd7ce5760a3601479d5fe0b232fd3a2101f034e1d9f1ee730d85cd72c
-
Filesize
832KB
MD5fc0fe2954d8d31c6fff15130df9629a6
SHA1d5ca1d23c36d41f7275ad3543d522652f2023b5b
SHA25686beb41a0fe0dceb1600b7342ec978015f6fa7cbae804fbef71215871f5a7c1a
SHA5123f9641c08a57ae4b5f39da7d2b77650724f879a4e39f52cd56812f9f8176b21779336adc432222f2dd98f2cfa8c84f71b063e6a1dd547bfdbba6c436068eff43
-
Filesize
623KB
MD5289b1ecb2f99441c032891e6f44fc49d
SHA1986def4ccb48c8bc58a7a2a31e4534c604e696d1
SHA256bfd177371a5f5c06945067823871568f8d106d686eeaaac72b2b0df5db4bd141
SHA51257695ae49c6a49afed7a3ed875ac860f8dc033034dafc96fc9c70f9b9c4cd734dd4730d2ddfa6af44dbc415344454b04f1d4c7aa000e8b76d05973776bb7c414
-
C:\Users\Admin\AppData\Local\Temp\is-SIDQ8.tmp\b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp
Filesize563KB
MD5a2297a294a7078c7569301bdd45c08f7
SHA1a02ec0bad2558f759b1f28be0b8440c145245797
SHA256cf674ea2db06efd15fa7f52eca915cb4388dcd7f7c342f70f2cedd1eda1b01b9
SHA512c601a4e737765588533be204a365be306b9935a11dfc1f13e5b08bbea5ca1f9de18ed717294b04284f5bca757c61e20a2f4be1c7a6bdc5dfbdc3f8f6af271b4c
-
C:\Users\Admin\AppData\Local\Temp\is-SIDQ8.tmp\b7333f56319e6a16fddb32b4db59927d18a3a7bb6d6c29d08bd9a214dfa15347.tmp
Filesize496KB
MD5e21afd9fc9b8d93e9dc539bf062d625a
SHA195fdec88d5be2642bbe55d9b902cc6a90890cc71
SHA256b4d02e7d0d3406832b56b6e7900f25a01cab5852518c3d43abf7d9b48c80bfc8
SHA5121aab79eb4bea258438902e12fb30526d13bfee5efdcde8f5863252f11a05e8656e9361f86956b4546a759618f269eb6350d3e3aaf52aecb98371cd9e22a71c91
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303