Analysis

  • max time kernel
    4265044s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    14-01-2022 16:01

General

  • Target

    ScanClientUpdate/KM.EKeyAlmaz1C.dll

  • Size

    165KB

  • MD5

    021e42c964102fd263d474427ee78193

  • SHA1

    8a6227b6db02b8ba278e13ccd6eece907e3657f0

  • SHA256

    2fbe9b3eda5da1e2eded989941fdbb4e967245a53231d9c0c9333eb6486215c7

  • SHA512

    d517bcb9cfdd4082242ed6a2d12abef54db5fb31da19ce3d91665268a9006a9d9cda69bf28a8395b501df1cc8b22d0968b7af965e8a120c2db6c1f85c2e528e2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ScanClientUpdate\KM.EKeyAlmaz1C.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ScanClientUpdate\KM.EKeyAlmaz1C.dll,#1
      2⤵
        PID:1508
    • C:\Windows\system32\MusNotification.exe
      C:\Windows\system32\MusNotification.exe
      1⤵
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1364

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1508-130-0x0000000000000000-mapping.dmp