Analysis

  • max time kernel
    144s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 05:37

General

  • Target

    776c7ce560ca7459a622d906f61ceba94e541898731d00cf2b14ba2b06037d74.exe

  • Size

    895KB

  • MD5

    52921821c843c9a6302b53e71dee5f91

  • SHA1

    5de258029cd2e1a83123462134a09e0beb86136c

  • SHA256

    776c7ce560ca7459a622d906f61ceba94e541898731d00cf2b14ba2b06037d74

  • SHA512

    ec5136fd37864f180b6a1698a943b56ba088cb1b98d3452accf6f4f11e35cf110a97dbd997f10f1cab21f2467abc7033b7c57cbaf06ad8a02b12b04b6b2b8d19

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\776c7ce560ca7459a622d906f61ceba94e541898731d00cf2b14ba2b06037d74.exe
    "C:\Users\Admin\AppData\Local\Temp\776c7ce560ca7459a622d906f61ceba94e541898731d00cf2b14ba2b06037d74.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\SysWOW64\fondue.exe
      "C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\system32\FonDUE.EXE
        "C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll
        3⤵
          PID:4856
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 96f460d212a2fd25331cd97eb1cc8b27 sgtyFMZXQkeyd83hdpyXkw.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:216
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4040

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4040-131-0x0000026833770000-0x0000026833780000-memory.dmp

      Filesize

      64KB

    • memory/4040-138-0x00000268363F0000-0x00000268363F4000-memory.dmp

      Filesize

      16KB