Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe
Resource
win10v2004-20231130-en
General
-
Target
4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe
-
Size
6.9MB
-
MD5
375605c9057738ed4c59eacb93216044
-
SHA1
45c389523c45403d85db73b18e50f2e9312aa9cf
-
SHA256
4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115
-
SHA512
45bc074f28c0083d53a9b4de29b931ee8a95878f096e38821539bce3dd94c096da920289da7fe1c44c0050c8743e5e0af4db42694a828547d4714a5bc3f9e240
-
SSDEEP
196608:gxOlhkHxfDumIwWJfU1IzKkGjAqiuGIqOg9zj:jjkHxfKTnJjzKkRtF9zj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 4844 wmaconvert.exe 4464 wmaconvert.exe -
Loads dropped DLL 3 IoCs
pid Process 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.49.94.194 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-NEBR4.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-CD0BT.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-FHALQ.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-NTS6N.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-18USK.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-GO2F2.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\plugins\internal\is-R1G7I.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-O1UUG.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-I1CRG.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-5GB2U.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-T327A.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-1CJGG.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-OKJU7.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-3C7DR.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-U40IV.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-CJ423.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-7LIB8.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-JQAF7.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-IFGGK.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-RNPR0.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-O1IIR.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-L9AG6.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-Q0BJ5.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-LK4UM.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-2IR3A.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-3THMO.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\uninstall\unins000.dat 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-TN7CD.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-MAK6K.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\is-FP3QR.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-M1R8F.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-F9UR6.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-9AAUA.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-PDHEP.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-QJ830.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-N5ABH.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-J5OIA.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\plugins\internal\is-TOLF6.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-3Q5OO.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File opened for modification C:\Program Files (x86)\ConvertWMA\wmaconvert.exe 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-5I23S.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-9VM8U.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-2I0BC.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-DD83M.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-VMBNT.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-DQ3DN.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-HFSKU.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-3K21B.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-8GHSO.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-L5FTR.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-6LM9J.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File opened for modification C:\Program Files (x86)\ConvertWMA\uninstall\unins000.dat 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-CNLMK.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-NKG9H.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-IPE7C.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-7JQHH.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-2FFCO.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-MAEGM.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-3S339.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-UH08S.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\uninstall\is-KOVOR.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-83M34.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\lessmsi\is-FKHNS.tmp 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1280 4692 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe 88 PID 4692 wrote to memory of 1280 4692 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe 88 PID 4692 wrote to memory of 1280 4692 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe 88 PID 1280 wrote to memory of 3280 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 91 PID 1280 wrote to memory of 3280 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 91 PID 1280 wrote to memory of 3280 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 91 PID 1280 wrote to memory of 4844 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 92 PID 1280 wrote to memory of 4844 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 92 PID 1280 wrote to memory of 4844 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 92 PID 1280 wrote to memory of 4504 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 96 PID 1280 wrote to memory of 4504 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 96 PID 1280 wrote to memory of 4504 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 96 PID 1280 wrote to memory of 4464 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 95 PID 1280 wrote to memory of 4464 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 95 PID 1280 wrote to memory of 4464 1280 4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp 95 PID 4504 wrote to memory of 4228 4504 net.exe 97 PID 4504 wrote to memory of 4228 4504 net.exe 97 PID 4504 wrote to memory of 4228 4504 net.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe"C:\Users\Admin\AppData\Local\Temp\4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\is-2HFN4.tmp\4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp"C:\Users\Admin\AppData\Local\Temp\is-2HFN4.tmp\4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp" /SL5="$A01DA,6950053,68096,C:\Users\Admin\AppData\Local\Temp\4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:3280
-
-
C:\Program Files (x86)\ConvertWMA\wmaconvert.exe"C:\Program Files (x86)\ConvertWMA\wmaconvert.exe" -i3⤵
- Executes dropped EXE
PID:4844
-
-
C:\Program Files (x86)\ConvertWMA\wmaconvert.exe"C:\Program Files (x86)\ConvertWMA\wmaconvert.exe" -s3⤵
- Executes dropped EXE
PID:4464
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 114⤵PID:4228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e8139f80c4c14f887b9655c9939ccbeb
SHA1f88c1a5c1c406793021f2ad3a7d44a63e9876c3b
SHA2569a4482e362c585c3943219b0f79adca00452ee1f50bf3f15ee4887c569ede4ac
SHA512737ec175f4be75693f036e9288acb3aaeb5dd533a7e32a7820f4ad5fb87836ff4a338d14b9b47c2bdb8c31bac04a1712d3c971a0659020768e7d182b86bb4bfd
-
Filesize
971KB
MD56cfba891b7a60cecc94763dade6855c6
SHA12a3be55374a716a3c2950af05efd3341ccef8b5c
SHA256288a7b5ba3bef0adf0c7abc8045c26c9bde15465c501d5d7b1be957551f22a32
SHA5122a4e1b4b3f301a54086b2dbb93b41925a495b41a6828cddf281f18da1191cc34f5f3f9493c6cb27a6d477ed3c1c4523094c3a2e0acad1e7c2a892cdc19d428e6
-
Filesize
136KB
MD523a3a76f5cff810a36b52e7d812702bb
SHA12183546ff53b9be46d0b8ce9ce465f515b9c70ca
SHA256a8881f2d7c949ccbe17bcea05d0dbea1aa6cdd9d08052a677f5c403c24312465
SHA51201f006c5450e635a2685b92c8b3edc8070efb465eb9689ec57739bc2063652178d4909580312aea57a0f11ce5a563a393940dfa3c935a52ddd541c21c5e873b0
-
C:\Users\Admin\AppData\Local\Temp\is-2HFN4.tmp\4892a23d13d211b03225e4af77033b859432aff1580e2b1a2ab38cf16167a115.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303