Analysis

  • max time kernel
    632s
  • max time network
    373s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    22-10-2021 14:38

General

  • Target

    Fri0575b7d291a755f8.exe

  • Size

    75KB

  • MD5

    3399436f50fad870cade4f68de68a76d

  • SHA1

    a690dd92fa2902ec5881b1ed55b1bb7316f48b70

  • SHA256

    9e9519db3a55dd28cc85ddb8e02990758fa23d0f387e006de073e30277bce862

  • SHA512

    c558ca8b467e3375d9f5e5db9801ce400cd5d0ce86b53ec4fe0d2452284afb32b642d915e6c89d9ec34bda1f81a75ad19c3aced770732573a0f55bfd0de6de03

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 8 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fri0575b7d291a755f8.exe
    "C:\Users\Admin\AppData\Local\Temp\Fri0575b7d291a755f8.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3124
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe 62f25bfb7abbcd7cb5fcfcaf4690af3f 01aP/BNOmUa3FfCqNSBYMA.0.1.0.3.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:1592
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2052
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
      2⤵
        PID:2648
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1888
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 62f25bfb7abbcd7cb5fcfcaf4690af3f 01aP/BNOmUa3FfCqNSBYMA.0.1.0.3.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:5068
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 62f25bfb7abbcd7cb5fcfcaf4690af3f 01aP/BNOmUa3FfCqNSBYMA.0.1.0.3.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1720

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2052-152-0x000001F84FB60000-0x000001F84FB70000-memory.dmp
      Filesize

      64KB

    • memory/2052-153-0x000001F8502E0000-0x000001F8502F0000-memory.dmp
      Filesize

      64KB

    • memory/2052-154-0x000001F8527F0000-0x000001F8527F4000-memory.dmp
      Filesize

      16KB

    • memory/2648-155-0x0000000000000000-mapping.dmp
    • memory/3124-146-0x0000000000620000-0x0000000000621000-memory.dmp
      Filesize

      4KB

    • memory/3124-148-0x00000000029C0000-0x00000000029C1000-memory.dmp
      Filesize

      4KB

    • memory/3124-149-0x0000000009860000-0x0000000009861000-memory.dmp
      Filesize

      4KB

    • memory/3124-150-0x0000000009B60000-0x0000000009B61000-memory.dmp
      Filesize

      4KB

    • memory/3124-151-0x00000000051D0000-0x00000000051D1000-memory.dmp
      Filesize

      4KB