Analysis

  • max time kernel
    128s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    03-02-2022 15:07

General

  • Target

    d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8.exe

  • Size

    406KB

  • MD5

    27618e24c576d88396237132b13e0b7a

  • SHA1

    5c7055878d8dd12a8bff678194f054ba74328a28

  • SHA256

    d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8

  • SHA512

    37250461692acc1cd34a0f406d8eb1b3043c06afdb91b598cecf19dbdac95f909c9cb36246a730fdfd215aabcb8af21529e96431e70a2cb3a5c2487945010055

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Sets service image path in registry 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8.exe
    "C:\Users\Admin\AppData\Local\Temp\d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\asasasasas.Exe
      "C:\Windows\System32\asasasasas.Exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Windows\SysWOW64\fondue.exe
        "C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4716
        • C:\Windows\system32\FonDUE.EXE
          "C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll
          4⤵
            PID:4388
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 136bcc1f9ccecd0afe7a4b89d410c0ae HEi96ZH5BEeV6ft6KBdI+g.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:3088
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4876

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\asasasasas.Exe
      MD5

      21bb098ec4f345d81f4eb2843ad8e6bd

      SHA1

      6e217ca6f104fa09f1e5546f6bcb51cbe00f11c4

      SHA256

      842e674dc7524ea7a7810465a6b94f7c163e1828925e2532daca066ee1cb48a2

      SHA512

      fbcd795e54dd22a67ddf463c28f1d693d58aabb1b76268515e193ce2b6b347704974dc42ca54dd081510540b4ac05f52f343fbb7380fa0638f66a5e9d2adf682

    • C:\Windows\SysWOW64\asasasasas.Exe
      MD5

      21bb098ec4f345d81f4eb2843ad8e6bd

      SHA1

      6e217ca6f104fa09f1e5546f6bcb51cbe00f11c4

      SHA256

      842e674dc7524ea7a7810465a6b94f7c163e1828925e2532daca066ee1cb48a2

      SHA512

      fbcd795e54dd22a67ddf463c28f1d693d58aabb1b76268515e193ce2b6b347704974dc42ca54dd081510540b4ac05f52f343fbb7380fa0638f66a5e9d2adf682

    • memory/4876-345-0x000001EE28D90000-0x000001EE28D94000-memory.dmp
      Filesize

      16KB