Analysis

  • max time kernel
    143s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 10:25

General

  • Target

    4dd36263992917f2d88bc8afd9ba55fa0bd52cef38414a4071eaa713fc765061.dll

  • Size

    42KB

  • MD5

    18e1a808cec738eefbe0c9a546be601e

  • SHA1

    e2f2861833c4e8e243fb771f3c1cd2dda62e4db2

  • SHA256

    4dd36263992917f2d88bc8afd9ba55fa0bd52cef38414a4071eaa713fc765061

  • SHA512

    f894c92d50dc4fa61127c23409854940e5639dcaeb5bba117d724f1a1e8f441376e7bb12adc828f38db5e7acf2c13195c803b30d214e7bcc367b0f9c9ebdea7b

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)

    suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4dd36263992917f2d88bc8afd9ba55fa0bd52cef38414a4071eaa713fc765061.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4dd36263992917f2d88bc8afd9ba55fa0bd52cef38414a4071eaa713fc765061.dll
      2⤵
        PID:1292
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe fbca45c16d21ef8a406776559c2d7f8b yzwVONUP0USTICKjlfzNaA.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:2156
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3772

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3772-173-0x00000200B3F90000-0x00000200B3FA0000-memory.dmp
      Filesize

      64KB

    • memory/3772-180-0x00000200B6C10000-0x00000200B6C14000-memory.dmp
      Filesize

      16KB