Analysis
-
max time kernel
97s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
26-01-2022 08:07
Static task
static1
Behavioral task
behavioral1
Sample
70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe
Resource
win10v2004-en-20220112
General
-
Target
70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe
-
Size
678KB
-
MD5
85ab0f963311cda7e0c1e7028dd30e34
-
SHA1
832d6afd5707a3dfda94db1587802a7afd5221ca
-
SHA256
70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea
-
SHA512
283ac02efbef15f7c2652fc5d9ca75187856ca49f24cff32e2ab3d08611570d9a3b806b50a52c69099a681094b8a9ca5e48bb167b48fe2aa7fa7224eb62cbfbb
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3440-143-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exedescription pid process target process PID 3404 set thread context of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4028 powershell.exe 4028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4028 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exedescription pid process target process PID 3404 wrote to memory of 4028 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe powershell.exe PID 3404 wrote to memory of 4028 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe powershell.exe PID 3404 wrote to memory of 4028 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe powershell.exe PID 3404 wrote to memory of 3500 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe schtasks.exe PID 3404 wrote to memory of 3500 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe schtasks.exe PID 3404 wrote to memory of 3500 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe schtasks.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe PID 3404 wrote to memory of 3440 3404 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe 70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe"C:\Users\Admin\AppData\Local\Temp\70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WdXHeFBBaIZC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WdXHeFBBaIZC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEC6C.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe"C:\Users\Admin\AppData\Local\Temp\70f4d7dc4bcfe2a231f5407a9b37743ca1397f04f358a41416cc1ce17f3b4dea.exe"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 6f294506f68a1d463797ac6025e94b56 r47ChdGul0a9kBdCP4mQbw.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpEC6C.tmpMD5
c63283a679ca38d8d1ec49aefd57e2be
SHA121dd035f8ca43749b608387930a4fc985e5422aa
SHA256d821313f36f0dcd985687e0096dc2f1c67aac60af84ead546d0f7a5fa3bf2ab6
SHA512140a25adf133303a44def83f99f198f9dad49b6c2e53db75d8fcd3338f69d4bf2e6c1fe4e8ac9a66f2bce2377f133b3369dd58791ccb1db7d97e74d3f97664b9
-
memory/3404-134-0x0000000005ED0000-0x0000000006474000-memory.dmpFilesize
5.6MB
-
memory/3404-135-0x0000000005830000-0x00000000058C2000-memory.dmpFilesize
584KB
-
memory/3404-136-0x00000000057B0000-0x00000000057BA000-memory.dmpFilesize
40KB
-
memory/3404-137-0x0000000005920000-0x0000000005EC4000-memory.dmpFilesize
5.6MB
-
memory/3404-138-0x0000000007D90000-0x0000000007E2C000-memory.dmpFilesize
624KB
-
memory/3404-133-0x0000000000D40000-0x0000000000DF2000-memory.dmpFilesize
712KB
-
memory/3440-143-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4028-149-0x0000000007DA0000-0x0000000007E06000-memory.dmpFilesize
408KB
-
memory/4028-152-0x0000000009410000-0x0000000009442000-memory.dmpFilesize
200KB
-
memory/4028-145-0x0000000006FE0000-0x0000000006FE1000-memory.dmpFilesize
4KB
-
memory/4028-146-0x0000000006FE2000-0x0000000006FE3000-memory.dmpFilesize
4KB
-
memory/4028-147-0x0000000007330000-0x0000000007352000-memory.dmpFilesize
136KB
-
memory/4028-148-0x0000000007CC0000-0x0000000007D26000-memory.dmpFilesize
408KB
-
memory/4028-141-0x0000000006E50000-0x0000000006E86000-memory.dmpFilesize
216KB
-
memory/4028-150-0x0000000008450000-0x000000000846E000-memory.dmpFilesize
120KB
-
memory/4028-151-0x0000000006FE5000-0x0000000006FE7000-memory.dmpFilesize
8KB
-
memory/4028-144-0x0000000007620000-0x0000000007C48000-memory.dmpFilesize
6.2MB
-
memory/4028-153-0x00000000716E0000-0x000000007172C000-memory.dmpFilesize
304KB
-
memory/4028-154-0x0000000008A10000-0x0000000008A2E000-memory.dmpFilesize
120KB
-
memory/4028-155-0x0000000009DB0000-0x000000000A42A000-memory.dmpFilesize
6.5MB
-
memory/4028-156-0x0000000009770000-0x000000000978A000-memory.dmpFilesize
104KB
-
memory/4028-158-0x00000000097E0000-0x00000000097EA000-memory.dmpFilesize
40KB
-
memory/4028-157-0x000000007FAA0000-0x000000007FAA1000-memory.dmpFilesize
4KB
-
memory/4028-159-0x00000000099F0000-0x0000000009A86000-memory.dmpFilesize
600KB
-
memory/4028-160-0x00000000099A0000-0x00000000099AE000-memory.dmpFilesize
56KB
-
memory/4028-161-0x0000000009AB0000-0x0000000009ACA000-memory.dmpFilesize
104KB
-
memory/4028-162-0x0000000009A90000-0x0000000009A98000-memory.dmpFilesize
32KB