Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 00:42

General

  • Target

    8ecbae4985b7df072bd6df4b60f194fdcabd92bb336e11f8ca40987a5a81b1e3.dll

  • Size

    240KB

  • MD5

    4167ba311c381dbda9f12c274b81e782

  • SHA1

    7feb73ac6aeef592a01039131a13bfa73fbba412

  • SHA256

    8ecbae4985b7df072bd6df4b60f194fdcabd92bb336e11f8ca40987a5a81b1e3

  • SHA512

    bd7ce739ead9aeb4c0c24a84ee39fcaefdf7e5f69b98b781bf61d332dc7a3ac002426c9512ded770a71ccf7572dc5227e1a04a61139661bb4fe98caf03b8caad

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8ecbae4985b7df072bd6df4b60f194fdcabd92bb336e11f8ca40987a5a81b1e3.dll,#1
    1⤵
      PID:2448
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe f1fbdc15c21e7c0fe44bd8abbce155ef fm0CT2DBe0mrTjSVnItbgg.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:5016
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2996

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2996-207-0x000001920BDA0000-0x000001920BDB0000-memory.dmp
      Filesize

      64KB

    • memory/2996-214-0x000001920F180000-0x000001920F184000-memory.dmp
      Filesize

      16KB