Analysis

  • max time kernel
    127s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    05-02-2022 00:54

General

  • Target

    79802d6a6be8433720857d2b53b46f8011ec734a237aae1c3c1fea50ff683c13.exe

  • Size

    2.9MB

  • MD5

    9225bab1b05498fde1ff93de2fd03c0c

  • SHA1

    c5acefee89cdbf24e99d311f804615aedef8f3df

  • SHA256

    79802d6a6be8433720857d2b53b46f8011ec734a237aae1c3c1fea50ff683c13

  • SHA512

    eb67805add7c45e469372d4c01c3572593f411eec81c735ae2ab56cd39230f6bf625b5b13b27e5f8aacd09743a34921a1ec45741940b0bd2b5efb0d8c83f9fbb

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79802d6a6be8433720857d2b53b46f8011ec734a237aae1c3c1fea50ff683c13.exe
    "C:\Users\Admin\AppData\Local\Temp\79802d6a6be8433720857d2b53b46f8011ec734a237aae1c3c1fea50ff683c13.exe"
    1⤵
      PID:4476
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 8dcf6efc18f19510a4661e71ff7b840f r2dtYM9WgUOnPFR7WjSYAA.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1964
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4568

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4568-142-0x0000023791E40000-0x0000023791E44000-memory.dmp

      Filesize

      16KB