Analysis

  • max time kernel
    40s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 20:24

General

  • Target

    yhhljgxudqeyowcinyde44154280653/db.dll

  • Size

    952KB

  • MD5

    64dc543f839f52eb26f658585332b48b

  • SHA1

    1207a7232c78c381cb6bacfa3d5485df2b5e59d3

  • SHA256

    cd7d5c9b8ce5d3d51a813a8e957fbfbfde426f159aa584937e35a8e057b24c8e

  • SHA512

    eb3f427e6a6ee3b4525f44ac412a2b4c64b76ac3efdaa0c2fa3f0dfbe5a1afd7052f78691ebd54c2cc0dcff02a3655b9e75b9d6de46a1bac4db38d1770e7512a

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\yhhljgxudqeyowcinyde44154280653\db.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\yhhljgxudqeyowcinyde44154280653\db.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        3⤵
          PID:4500
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\System32\svchost.exe"
          3⤵
            PID:364
      • C:\Windows\System32\WaaSMedicAgent.exe
        C:\Windows\System32\WaaSMedicAgent.exe 5b6c16b767648cbf303f0392125451d8 DtzYR4PCy0KeC6s7UGGf8A.0.1.0.0.0
        1⤵
        • Modifies data under HKEY_USERS
        PID:1340
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
        1⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:4896

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/364-140-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-139-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-147-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-145-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-134-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-135-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-144-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-138-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-136-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-143-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/364-142-0x0000000000400000-0x00000000008C2000-memory.dmp

        Filesize

        4.8MB

      • memory/4504-130-0x00000000008F0000-0x00000000009E9000-memory.dmp

        Filesize

        996KB

      • memory/4896-131-0x000001F608730000-0x000001F608740000-memory.dmp

        Filesize

        64KB

      • memory/4896-133-0x000001F60B490000-0x000001F60B494000-memory.dmp

        Filesize

        16KB

      • memory/4896-132-0x000001F608790000-0x000001F6087A0000-memory.dmp

        Filesize

        64KB