Overview
overview
10Static
static
NDt93WWQwd089H7.exe
windows7_x64
10NDt93WWQwd089H7.exe
windows10-2004_x64
4YyeznSFcE5IUYLS.exe
windows7_x64
10YyeznSFcE5IUYLS.exe
windows10-2004_x64
4w7a5Qzx6sR1WxLJ.exe
windows7_x64
1w7a5Qzx6sR1WxLJ.exe
windows10-2004_x64
10wCRnCAMZ3yT8BQ2.exe
windows7_x64
10wCRnCAMZ3yT8BQ2.exe
windows10-2004_x64
10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
21-02-2022 11:06
Static task
static1
Behavioral task
behavioral1
Sample
NDt93WWQwd089H7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
NDt93WWQwd089H7.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
YyeznSFcE5IUYLS.exe
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
YyeznSFcE5IUYLS.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral5
Sample
w7a5Qzx6sR1WxLJ.exe
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
w7a5Qzx6sR1WxLJ.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
wCRnCAMZ3yT8BQ2.exe
Resource
win7-en-20211208
General
-
Target
NDt93WWQwd089H7.exe
-
Size
1.3MB
-
MD5
0f330f518f4f71f0735cce4eaf1612d7
-
SHA1
f34909417588543112974ebbc0fa8236a8a604c1
-
SHA256
702554b4a0770d70bd5972318d2294ef2b26001595b574d122264b8c1793457c
-
SHA512
ee5ec83814a64c56bdfdaec885396c86364ccf5bd7eaa25b3bdd2c43c6a8c7427bdf2a7514a7c0043294cdf7c9b89699a818ca65d5e4ef6f5d04c0de94597db3
Malware Config
Signatures
-
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 2976 svchost.exe Token: SeCreatePagefilePrivilege 2976 svchost.exe Token: SeShutdownPrivilege 2976 svchost.exe Token: SeCreatePagefilePrivilege 2976 svchost.exe Token: SeShutdownPrivilege 2976 svchost.exe Token: SeCreatePagefilePrivilege 2976 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
NDt93WWQwd089H7.exefondue.exedescription pid process target process PID 4472 wrote to memory of 4476 4472 NDt93WWQwd089H7.exe fondue.exe PID 4472 wrote to memory of 4476 4472 NDt93WWQwd089H7.exe fondue.exe PID 4472 wrote to memory of 4476 4472 NDt93WWQwd089H7.exe fondue.exe PID 4476 wrote to memory of 4680 4476 fondue.exe FonDUE.EXE PID 4476 wrote to memory of 4680 4476 fondue.exe FonDUE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\NDt93WWQwd089H7.exe"C:\Users\Admin\AppData\Local\Temp\NDt93WWQwd089H7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\fondue.exe"C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\FonDUE.EXE"C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll3⤵PID:4680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2976