Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
11-12-2023 14:52
Static task
static1
Behavioral task
behavioral1
Sample
199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe
Resource
win10-20231020-en
General
-
Target
199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe
-
Size
6.9MB
-
MD5
c11add4e5504cf2aa821601a2dfbd836
-
SHA1
97d8ff3eb89469239a3c3efceaff9954fd810ff3
-
SHA256
199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268
-
SHA512
42b5c8e1b798005fbd751f9a864b8f3cd7359d4f49c6cd4c8252476220d2a67815b7452acb682846f662c4c761ef5584ff922e5dddabd24c66b5f49a113e7fbd
-
SSDEEP
196608:0DoG3bFqjpLC0TSMLsn33HR83v9i8l7INzj:0DyNLCWZ2HS9iQ7INzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 4112 wmaconvert.exe 4808 wmaconvert.exe -
Loads dropped DLL 3 IoCs
pid Process 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 Destination IP 194.49.94.194 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-GQHN1.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-EVURJ.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-1IGF3.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-1JB6L.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\plugins\internal\is-KT5JU.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-IGMF5.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-8VSBN.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-DNSLM.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-85LNI.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-10VIN.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-2G1T9.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-S5DGL.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\lessmsi\is-E8EBQ.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-E9LF1.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-R77JI.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-2DF33.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-SOG4V.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File opened for modification C:\Program Files (x86)\ConvertWMA\uninstall\unins000.dat 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-22PII.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-2BIO3.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-I476V.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-F1MDP.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\uninstall\unins000.dat 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\uninstall\is-384FR.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-PUD8P.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-M8R2G.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-TJNFA.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-IL5O2.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-7114E.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-G8V51.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-PM2OI.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-4I4M0.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-1PF0C.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-C7JTQ.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-DBE98.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-MIOPS.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-MV171.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File opened for modification C:\Program Files (x86)\ConvertWMA\wmaconvert.exe 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-7OPI6.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\is-U2VDV.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-AB6JB.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-F4HJJ.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-L69CL.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-8GBHC.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-PSTNU.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-PAO7U.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-AS933.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-DAIDJ.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\stuff\is-PDOJJ.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-CJ23O.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-P6KI1.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-UV60K.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-D1JN9.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-FN02H.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-ING1J.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\plugins\internal\is-I07K5.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-JBOL3.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-P1CGK.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-SJD97.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-CSIBD.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-2CBKE.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-CR554.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp File created C:\Program Files (x86)\ConvertWMA\bin\x86\is-EPA77.tmp 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2332 wrote to memory of 4844 2332 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe 71 PID 2332 wrote to memory of 4844 2332 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe 71 PID 2332 wrote to memory of 4844 2332 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe 71 PID 4844 wrote to memory of 5064 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 72 PID 4844 wrote to memory of 5064 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 72 PID 4844 wrote to memory of 5064 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 72 PID 4844 wrote to memory of 4112 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 74 PID 4844 wrote to memory of 4112 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 74 PID 4844 wrote to memory of 4112 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 74 PID 4844 wrote to memory of 4036 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 77 PID 4844 wrote to memory of 4036 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 77 PID 4844 wrote to memory of 4036 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 77 PID 4844 wrote to memory of 4808 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 75 PID 4844 wrote to memory of 4808 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 75 PID 4844 wrote to memory of 4808 4844 199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp 75 PID 4036 wrote to memory of 1952 4036 net.exe 78 PID 4036 wrote to memory of 1952 4036 net.exe 78 PID 4036 wrote to memory of 1952 4036 net.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe"C:\Users\Admin\AppData\Local\Temp\199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\is-6HOOQ.tmp\199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp"C:\Users\Admin\AppData\Local\Temp\is-6HOOQ.tmp\199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp" /SL5="$50234,6971036,68096,C:\Users\Admin\AppData\Local\Temp\199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:5064
-
-
C:\Program Files (x86)\ConvertWMA\wmaconvert.exe"C:\Program Files (x86)\ConvertWMA\wmaconvert.exe" -i3⤵
- Executes dropped EXE
PID:4112
-
-
C:\Program Files (x86)\ConvertWMA\wmaconvert.exe"C:\Program Files (x86)\ConvertWMA\wmaconvert.exe" -s3⤵
- Executes dropped EXE
PID:4808
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 114⤵PID:1952
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD50d810567745aceb7ec1f831a27dfd744
SHA189fe6c9cc4f827c644a03c894da8762ed4e86435
SHA256ba0eb9a745612933a585bc2c5d3ba352940a1e293bd5a00e51f42681d12c6194
SHA512e5fbff0db6c4062ba60212dbba18872920a869e34409a1de62b9d088c5801d4525407dcf1526f59665860099b2261b73a2088161536ee47d49056b25743f76be
-
Filesize
1.1MB
MD5656ab695a1c3a7684c31f8b7d71f1377
SHA1f5ce49856d022e94f92b3974054d8cec7a5eb615
SHA25653eab005516fd4f6524aa5ea7e56955910744c8ae8ec7a7e5916484338fc2a0a
SHA51214667b788ff80dd0ba2872178f17080e1f40af639f81d8a40fdbfceeb14d3062dd74e33342e62858c29e47210576e4c7f601de8ed6e2a467c7f2f93f74f0792a
-
Filesize
154KB
MD53ef7e24450c0f0c83af77f24fbe33310
SHA1767548d2169869e43308578ec44be060eb485374
SHA256a096a208e729ff2c9f8a9946bcb4f36040fa1c7582f393a586941aea65b8071f
SHA51266c41d9df90e9368aadbe5fb33df0a0b2d66385fcfd752f8c70519ae39d80c4df52189af5ce662ad7a689764212ea9e6cbfe6a220b15cfe5334ad9006708d0ae
-
C:\Users\Admin\AppData\Local\Temp\is-6HOOQ.tmp\199d55e216ed3396255e877377fd760b1b8b20b3508e6fabc2ec04cfcaddd268.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303