Analysis

  • max time kernel
    121s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 03:26

General

  • Target

    e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e.exe

  • Size

    142KB

  • MD5

    7338b335ad5471cb67658f27836374f0

  • SHA1

    eb0e81598d8526d88cac4695a3e9360cc8fbb331

  • SHA256

    e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e

  • SHA512

    1abaf8f72d10eaa5a77dabaeb20d922228c09c3da9756a09a63b7dc77cc9e866b3d47aad17bf2ae2846458964af6c028975c5631116a677a80ff317769ccf2f7

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e.exe
    "C:\Users\Admin\AppData\Local\Temp\e167b20f1acf48f7ce0ae33a218e2c1b300b41c012ededf03e7a3522a4ebe95e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Windows\SysWOW64\fondue.exe
      "C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\system32\FonDUE.EXE
        "C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll
        3⤵
          PID:4176
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe b1d1c4daf7f3598d3a38f82e92b5f717 NVG2SM/LfUGScfRBoNVdNQ.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:952
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2348

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2348-188-0x000001ED8A740000-0x000001ED8A744000-memory.dmp

      Filesize

      16KB