Analysis

  • max time kernel
    114s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    04-02-2022 10:34

General

  • Target

    323d0cf9ac1c750761f66482154dbd3144dae7336c955a4576cb4cce6438a6ba.exe

  • Size

    1.1MB

  • MD5

    eec690302795ed155f0b1ccc5b3bb9a9

  • SHA1

    856956c954442ff1a1b91afcc01a3b5bcb82900c

  • SHA256

    323d0cf9ac1c750761f66482154dbd3144dae7336c955a4576cb4cce6438a6ba

  • SHA512

    7b95a8b3d9690e202d6d1c16b878c97921e6e386f6b509f1a5c24923722cf926d54f12b6792d5d901d0a39fcc38e630ffc356d3513a92db62077046fedccc152

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\323d0cf9ac1c750761f66482154dbd3144dae7336c955a4576cb4cce6438a6ba.exe
    "C:\Users\Admin\AppData\Local\Temp\323d0cf9ac1c750761f66482154dbd3144dae7336c955a4576cb4cce6438a6ba.exe"
    1⤵
      PID:1716
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 6c8ec2b5da49d8088235d098b897c8ad 0U9bhL95tEeJs+CDFSzwcQ.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:4696
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4608

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4608-130-0x00000160BD380000-0x00000160BD390000-memory.dmp
      Filesize

      64KB

    • memory/4608-137-0x00000160C0100000-0x00000160C0104000-memory.dmp
      Filesize

      16KB