Analysis

  • max time kernel
    121s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 03:54

General

  • Target

    cb8d412bcde5007a389cfbf650e356fc4aca9c56499594af40306234e85c52db.exe

  • Size

    828KB

  • MD5

    dcaa19fad14b32f9cf16429dc4f0c4bd

  • SHA1

    c50601975c549ed45f5d1d07874b853b48810fb4

  • SHA256

    cb8d412bcde5007a389cfbf650e356fc4aca9c56499594af40306234e85c52db

  • SHA512

    c78ead2fc230ade657e87609107861802ace6c25bfb876d1732bb9be006b22cb56550997357fabc14b1713ba8392de0de0f5612020344820a36c10a5a7368c25

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb8d412bcde5007a389cfbf650e356fc4aca9c56499594af40306234e85c52db.exe
    "C:\Users\Admin\AppData\Local\Temp\cb8d412bcde5007a389cfbf650e356fc4aca9c56499594af40306234e85c52db.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\fondue.exe
      "C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\system32\FonDUE.EXE
        "C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll
        3⤵
          PID:1336
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe c6b0c1bba92b5a1468ea32979bc61acf jZBXN6E8tEePh2uHcCVyBQ.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:936
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3900

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3900-142-0x0000015889640000-0x0000015889644000-memory.dmp

      Filesize

      16KB