Analysis

  • max time kernel
    151s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 12:22

General

  • Target

    dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b.dll

  • Size

    1003KB

  • MD5

    731d724e8859ef063c03a8b1ab7f81ec

  • SHA1

    1acf3108bf1e376c8848fbb25dc87424f2c2a39c

  • SHA256

    dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b

  • SHA512

    758e1ca443288ea016b08af27c50a6ec9cedd99edae7e0806c4ff570f9e352e62959bb2c6d7d0b1df170f3bb3e1cd9418046044e68d31a5c800d8500f315464e

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b.dll,#1
    1⤵
      PID:4656
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 1d99faa54b0bca1ff0617e4666c30c48 zIqyfjkp1UaTvPJr2iUtfw.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:4948
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4856

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4856-142-0x00000240B3590000-0x00000240B3594000-memory.dmp
      Filesize

      16KB