Analysis

  • max time kernel
    153s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 03:47

General

  • Target

    d9f2a175430adc77bc769e257717d0c3afdef060686fd7da3b7f3871f1e9a9d2.exe

  • Size

    987KB

  • MD5

    13448c9fe9b5e6b6a6d3994bba8f9555

  • SHA1

    962eb66a7322172d457bfd81be7502cec6d7b5f9

  • SHA256

    d9f2a175430adc77bc769e257717d0c3afdef060686fd7da3b7f3871f1e9a9d2

  • SHA512

    1cbf63a85385baef34dab3fc18c080a18c3a89de3c18177e1c3e7372f1acdba3c25635855355b2de937bc667ec47f6749693f9130fb15e80b9d9e4f61d4f7bc8

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9f2a175430adc77bc769e257717d0c3afdef060686fd7da3b7f3871f1e9a9d2.exe
    "C:\Users\Admin\AppData\Local\Temp\d9f2a175430adc77bc769e257717d0c3afdef060686fd7da3b7f3871f1e9a9d2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\SysWOW64\fondue.exe
      "C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\system32\FonDUE.EXE
        "C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll
        3⤵
          PID:732
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe af08a7ddbdbf09171338581353bd0f7b 1Bzvc8Hf9kODlmyCQW+cNg.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1304
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4680-130-0x0000022E28370000-0x0000022E28380000-memory.dmp

      Filesize

      64KB

    • memory/4680-137-0x0000022E2B0F0000-0x0000022E2B0F4000-memory.dmp

      Filesize

      16KB