Analysis

  • max time kernel
    119s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 09:59

General

  • Target

    bd7763a358d2298acc15ec1ff83e11503e4e6795aec508a0e66365b436ae24c0.dll

  • Size

    192KB

  • MD5

    ffbe2fdbbbf374ef0873925d707db1a7

  • SHA1

    adc6ca45d1040971b6e0c5dfbf045ce6ab118e47

  • SHA256

    bd7763a358d2298acc15ec1ff83e11503e4e6795aec508a0e66365b436ae24c0

  • SHA512

    46339f292c317862a03e6001dd0b00110018815a753c32da57d9625921ef42584d98d5c4f6ce13a7cd16239ae3a8c7193a8a9a123b37c3a17132d32c91319d7f

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bd7763a358d2298acc15ec1ff83e11503e4e6795aec508a0e66365b436ae24c0.dll,#1
    1⤵
      PID:4972
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 3bfded306868655d1c48755eb73a782c sy/TUJMI1UWZGzvQxYOERw.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:2932
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4576

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4576-130-0x00000187C3F30000-0x00000187C3F40000-memory.dmp

      Filesize

      64KB

    • memory/4576-131-0x00000187C3FA0000-0x00000187C3FB0000-memory.dmp

      Filesize

      64KB

    • memory/4576-132-0x00000187C6CB0000-0x00000187C6CB4000-memory.dmp

      Filesize

      16KB