Analysis

  • max time kernel
    124s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 08:53

General

  • Target

    ec367e5635e82720c82dd9034677d2039c5225f7e90204bde718685c6a69f304.exe

  • Size

    132KB

  • MD5

    bdac9fe9afb1674c323add1bbaa75ab9

  • SHA1

    c52dd6892f1dbbfb5b783a683401b78c0e4e2b18

  • SHA256

    ec367e5635e82720c82dd9034677d2039c5225f7e90204bde718685c6a69f304

  • SHA512

    a2adc1b7a9b8b50f4a40129492847ceb7f4ccb5f45a7cea38d710bcde3e9d6cc8b74df684fa7b5a9ddf72b4e1f4c65f91b743028f7c8f0730ed8e210d175fd9c

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec367e5635e82720c82dd9034677d2039c5225f7e90204bde718685c6a69f304.exe
    "C:\Users\Admin\AppData\Local\Temp\ec367e5635e82720c82dd9034677d2039c5225f7e90204bde718685c6a69f304.exe"
    1⤵
      PID:4212
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe cb6ad55639dc4b1943e275a1e0feb6f5 PPhOZ3TibEms6cG7B6yjiw.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:3316
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:5016

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5016-130-0x0000021D51380000-0x0000021D51390000-memory.dmp

      Filesize

      64KB

    • memory/5016-137-0x0000021D54100000-0x0000021D54104000-memory.dmp

      Filesize

      16KB