Analysis

  • max time kernel
    4265089s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    14-01-2022 16:01

General

  • Target

    ScanClientUpdate/KM.FileSystem.dll

  • Size

    282KB

  • MD5

    66534e53d8751a24a767221fed01268d

  • SHA1

    fc781887fd0579044bbf783e6c408eb0eea43485

  • SHA256

    3b94cc71c325f9068105b9e7d5c9667b1de2bde85b7abc5b29ff649fd54715c4

  • SHA512

    1f1b784b280bc34761ae93893ae7d95ebc6e5515542f153df7c91b00adfa796b3b2bee1a5857e0bb07d13c93b4df0eec3e1fd85911c79153b2d6c824a3a79369

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ScanClientUpdate\KM.FileSystem.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ScanClientUpdate\KM.FileSystem.dll,#1
      2⤵
        PID:3184
    • C:\Windows\system32\MusNotification.exe
      C:\Windows\system32\MusNotification.exe
      1⤵
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1796

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3184-130-0x0000000000000000-mapping.dmp