Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 14:11

General

  • Target

    1419449029f5cc7233d9a291fa6133bc9ddc5f55142687a664616a0ad9168822.exe

  • Size

    471KB

  • MD5

    6722ea5ab3944ede0f14ae67ca6297b6

  • SHA1

    ab996f267c92311c3836391111f1d7c0adc0ed96

  • SHA256

    1419449029f5cc7233d9a291fa6133bc9ddc5f55142687a664616a0ad9168822

  • SHA512

    33f65ea8eb66c5944232239ef74e65678a896e57a8f9122e3be40a943db44f0f6c21875da36b347961ee0395444a9e46ecc8c7133d8a5e23f2b195fe030ee3be

  • SSDEEP

    6144:KPOC5HZ1vVb4e7mlK5MpQtdlpeiSp4RVlPfGrROMgmNZH29wO/Ua42:KPTHZb4e7mlK5MpQtbKKx6NZW4a42

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 11 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1419449029f5cc7233d9a291fa6133bc9ddc5f55142687a664616a0ad9168822.exe
    "C:\Users\Admin\AppData\Local\Temp\1419449029f5cc7233d9a291fa6133bc9ddc5f55142687a664616a0ad9168822.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe" /c 49
      2⤵
      • Executes dropped EXE
      PID:648
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\smss.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\smss.exe" /c 30
      2⤵
      • Executes dropped EXE
      PID:4920
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhst3g.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhst3g.exe" /c 68
      2⤵
      • Executes dropped EXE
      PID:5096
    • C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe
      C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe /c 33
      2⤵
      • Executes dropped EXE
      PID:2780
    • C:\PROGRA~3\sessmgr.exe
      C:\PROGRA~3\sessmgr.exe /c 9
      2⤵
      • Executes dropped EXE
      PID:5060
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe /c 98
      2⤵
      • Executes dropped EXE
      PID:4476
    • C:\ProgramData\Microsoft\esentutl.exe
      C:\ProgramData\Microsoft\esentutl.exe /c 26
      2⤵
      • Executes dropped EXE
      PID:4256
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\clipsrv.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\clipsrv.exe" /c 16
      2⤵
      • Executes dropped EXE
      PID:3464
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe" /c 10
      2⤵
      • Executes dropped EXE
      PID:3484
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe" /r
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe" /c 39
        3⤵
        • Executes dropped EXE
        PID:2080
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\smss.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\smss.exe" /c 80
        3⤵
        • Executes dropped EXE
        PID:4640
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhst3g.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhst3g.exe" /c 24
        3⤵
        • Executes dropped EXE
        PID:984
      • C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe
        C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe /c 83
        3⤵
        • Executes dropped EXE
        PID:1044
      • C:\PROGRA~3\sessmgr.exe
        C:\PROGRA~3\sessmgr.exe /c 29
        3⤵
        • Executes dropped EXE
        PID:1132
      • C:\Windows\spoolsv.exe
        C:\Windows\spoolsv.exe /c 80
        3⤵
        • Executes dropped EXE
        PID:1392
      • C:\ProgramData\Microsoft\esentutl.exe
        C:\ProgramData\Microsoft\esentutl.exe /c 45
        3⤵
        • Executes dropped EXE
        PID:4244
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\clipsrv.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\clipsrv.exe" /c 93
        3⤵
        • Executes dropped EXE
        PID:4084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\sessmgr.exe

    Filesize

    471KB

    MD5

    31fe59c25f8831ba49a901e274fe00b4

    SHA1

    c549f3d7a84b07ff59c94c03bfc1402655181e9b

    SHA256

    96cea7e0b8c62d82d12d4f7f60098f044c15ad940d34e487c0d33170a2847811

    SHA512

    38825ee36a64645ab8d187dfb15ca2c704109f986065070012aae01a9f154a9f10c61e90443e7d71f4ff7ae91775cf5f8d40f23f592a59007523df661f46e03e

  • C:\ProgramData\Microsoft\esentutl.exe

    Filesize

    471KB

    MD5

    fb52866585d98a1d50f38da35d7dbd2e

    SHA1

    e01ba0185d39e41fa6d4014094356f9431f7499c

    SHA256

    dfabdc9243645bcb6b4f0d79a15c4ed6255bb552a625a05196e6caddc3b6a176

    SHA512

    bb4ac12063a7485b66c157a2a93276026c95155ead57c314ed1b45532335ca721b17647425f47f4bcb4a31db62e6e374b1ae4a664dbcaceedc0f9df93f1c880c

  • C:\ProgramData\Microsoft\esentutl.exe

    Filesize

    471KB

    MD5

    fb52866585d98a1d50f38da35d7dbd2e

    SHA1

    e01ba0185d39e41fa6d4014094356f9431f7499c

    SHA256

    dfabdc9243645bcb6b4f0d79a15c4ed6255bb552a625a05196e6caddc3b6a176

    SHA512

    bb4ac12063a7485b66c157a2a93276026c95155ead57c314ed1b45532335ca721b17647425f47f4bcb4a31db62e6e374b1ae4a664dbcaceedc0f9df93f1c880c

  • C:\ProgramData\Microsoft\esentutl.exe

    Filesize

    471KB

    MD5

    fb52866585d98a1d50f38da35d7dbd2e

    SHA1

    e01ba0185d39e41fa6d4014094356f9431f7499c

    SHA256

    dfabdc9243645bcb6b4f0d79a15c4ed6255bb552a625a05196e6caddc3b6a176

    SHA512

    bb4ac12063a7485b66c157a2a93276026c95155ead57c314ed1b45532335ca721b17647425f47f4bcb4a31db62e6e374b1ae4a664dbcaceedc0f9df93f1c880c

  • C:\ProgramData\sessmgr.exe

    Filesize

    471KB

    MD5

    31fe59c25f8831ba49a901e274fe00b4

    SHA1

    c549f3d7a84b07ff59c94c03bfc1402655181e9b

    SHA256

    96cea7e0b8c62d82d12d4f7f60098f044c15ad940d34e487c0d33170a2847811

    SHA512

    38825ee36a64645ab8d187dfb15ca2c704109f986065070012aae01a9f154a9f10c61e90443e7d71f4ff7ae91775cf5f8d40f23f592a59007523df661f46e03e

  • C:\ProgramData\sessmgr.exe

    Filesize

    471KB

    MD5

    31fe59c25f8831ba49a901e274fe00b4

    SHA1

    c549f3d7a84b07ff59c94c03bfc1402655181e9b

    SHA256

    96cea7e0b8c62d82d12d4f7f60098f044c15ad940d34e487c0d33170a2847811

    SHA512

    38825ee36a64645ab8d187dfb15ca2c704109f986065070012aae01a9f154a9f10c61e90443e7d71f4ff7ae91775cf5f8d40f23f592a59007523df661f46e03e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\AppData\Local\Microsoft\clipsrv.exe

    Filesize

    471KB

    MD5

    7582ed233f0270ac632755956433a454

    SHA1

    f45b3e24292ebb2e62225493616af78b52c7b3ba

    SHA256

    dab42de2087b04536bb300999af52c11fc77dcc4cc3f1a669f4cdcffc39fc6b2

    SHA512

    81ad702505da8c27af7d4b391a0e9cc19ce3ff81916e1bea86d7d14defb4e1a440853ceebb7c6558a8b739ec60d9f64921d1a3a67e2d9323614c73c0ed044a27

  • C:\Users\Admin\AppData\Local\Microsoft\clipsrv.exe

    Filesize

    471KB

    MD5

    7582ed233f0270ac632755956433a454

    SHA1

    f45b3e24292ebb2e62225493616af78b52c7b3ba

    SHA256

    dab42de2087b04536bb300999af52c11fc77dcc4cc3f1a669f4cdcffc39fc6b2

    SHA512

    81ad702505da8c27af7d4b391a0e9cc19ce3ff81916e1bea86d7d14defb4e1a440853ceebb7c6558a8b739ec60d9f64921d1a3a67e2d9323614c73c0ed044a27

  • C:\Users\Admin\AppData\Local\Microsoft\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\AppData\Local\Microsoft\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\AppData\Local\Microsoft\smss.exe

    Filesize

    471KB

    MD5

    5377907b0afcd3630e84d1a0640a1f03

    SHA1

    f4556636f967aaf11dfcc1f288db393f3541adae

    SHA256

    1896a7f8041cc38167daf35a2d321d5fccaa8c3d67834c68b9eafd5a6c5c5fd0

    SHA512

    80d16e3ef927ff7560ff46ea09731c42dd64ec01046b2ca9cfd0c0c1638a65acd3f6155d267c75c5cff56cc3850452d3271bf0045a219db584e9e278d9f1513d

  • C:\Users\Admin\AppData\Local\Microsoft\smss.exe

    Filesize

    471KB

    MD5

    5377907b0afcd3630e84d1a0640a1f03

    SHA1

    f4556636f967aaf11dfcc1f288db393f3541adae

    SHA256

    1896a7f8041cc38167daf35a2d321d5fccaa8c3d67834c68b9eafd5a6c5c5fd0

    SHA512

    80d16e3ef927ff7560ff46ea09731c42dd64ec01046b2ca9cfd0c0c1638a65acd3f6155d267c75c5cff56cc3850452d3271bf0045a219db584e9e278d9f1513d

  • C:\Users\Admin\AppData\Local\Temp\Twain002.Mtx

    Filesize

    10B

    MD5

    d79500d8e70b11598d794d79cc5caa76

    SHA1

    cfda7a0d71e6fff76d128795d3db58afe47dc706

    SHA256

    7da8b61a4f0cbbe77123cf303f8139655dbf824ca28fbc24b6b5e954d2ff0864

    SHA512

    b9df7785913ec0978769a1a57b7b9bf17cd4c9c5c97d608426ffeefc829a2c5cad3d56c3789e36e8dfbc2854ab064d27269f0bd96194766e58eaf78e7b0e7d5a

  • C:\Users\Admin\AppData\Roaming\MICROS~1\dllhost.exe

    Filesize

    471KB

    MD5

    11b1ff0cd4f733752ff519d6ed2d21ba

    SHA1

    07df12f85794db05ab4d1d7ab1b60907d8316c82

    SHA256

    905148039ad29cb6159192436b0d8e1832188fff5bb83b64e1fb7f91b770b823

    SHA512

    d3ffceb400325f0572d8b7bddc848412d0a0466ced7851055aab81813971a7eaeb4e6c4283825d2ccdff64697a4305878293f9a4551a3eb600658327002d1400

  • C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe

    Filesize

    471KB

    MD5

    11b1ff0cd4f733752ff519d6ed2d21ba

    SHA1

    07df12f85794db05ab4d1d7ab1b60907d8316c82

    SHA256

    905148039ad29cb6159192436b0d8e1832188fff5bb83b64e1fb7f91b770b823

    SHA512

    d3ffceb400325f0572d8b7bddc848412d0a0466ced7851055aab81813971a7eaeb4e6c4283825d2ccdff64697a4305878293f9a4551a3eb600658327002d1400

  • C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe

    Filesize

    471KB

    MD5

    11b1ff0cd4f733752ff519d6ed2d21ba

    SHA1

    07df12f85794db05ab4d1d7ab1b60907d8316c82

    SHA256

    905148039ad29cb6159192436b0d8e1832188fff5bb83b64e1fb7f91b770b823

    SHA512

    d3ffceb400325f0572d8b7bddc848412d0a0466ced7851055aab81813971a7eaeb4e6c4283825d2ccdff64697a4305878293f9a4551a3eb600658327002d1400

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\clipsrv.exe

    Filesize

    471KB

    MD5

    7582ed233f0270ac632755956433a454

    SHA1

    f45b3e24292ebb2e62225493616af78b52c7b3ba

    SHA256

    dab42de2087b04536bb300999af52c11fc77dcc4cc3f1a669f4cdcffc39fc6b2

    SHA512

    81ad702505da8c27af7d4b391a0e9cc19ce3ff81916e1bea86d7d14defb4e1a440853ceebb7c6558a8b739ec60d9f64921d1a3a67e2d9323614c73c0ed044a27

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhst3g.exe

    Filesize

    471KB

    MD5

    c7609d8bcf0ccbb8582a58fb84618fa7

    SHA1

    13111d097c54b20426d90101d528072e241484cf

    SHA256

    ce94e36a1742247040e14a7f3da19fd04c86e148abf357022670cdbe535a60f1

    SHA512

    959039dbbd873de6d3eb85aea708d22a75ef559cccc5d3079f1c8b30f3aae88dbc6450a7295915c5593862fb5b3908b1f56af8230963655d4f7f9deb5768b976

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\smss.exe

    Filesize

    471KB

    MD5

    5377907b0afcd3630e84d1a0640a1f03

    SHA1

    f4556636f967aaf11dfcc1f288db393f3541adae

    SHA256

    1896a7f8041cc38167daf35a2d321d5fccaa8c3d67834c68b9eafd5a6c5c5fd0

    SHA512

    80d16e3ef927ff7560ff46ea09731c42dd64ec01046b2ca9cfd0c0c1638a65acd3f6155d267c75c5cff56cc3850452d3271bf0045a219db584e9e278d9f1513d

  • C:\Windows\spoolsv.exe

    Filesize

    471KB

    MD5

    8fe18cc17f7345c311584e8a5b668154

    SHA1

    0ea89ff33e6b1739fc5199be064cfa0045bc0b97

    SHA256

    5169be6d95bb5e6a75f8a8d736186f9f8059fe3a376f202a0f3b22eedca8881d

    SHA512

    517bec4442e4fc607b746ed49400e0e2ff359a2734c76c606985bed644760c6af9f1738a0b35238091a2660e2d376d0b8887da49eda07ded4ca40014966bbb80

  • C:\Windows\spoolsv.exe

    Filesize

    471KB

    MD5

    8fe18cc17f7345c311584e8a5b668154

    SHA1

    0ea89ff33e6b1739fc5199be064cfa0045bc0b97

    SHA256

    5169be6d95bb5e6a75f8a8d736186f9f8059fe3a376f202a0f3b22eedca8881d

    SHA512

    517bec4442e4fc607b746ed49400e0e2ff359a2734c76c606985bed644760c6af9f1738a0b35238091a2660e2d376d0b8887da49eda07ded4ca40014966bbb80

  • C:\Windows\spoolsv.exe

    Filesize

    471KB

    MD5

    8fe18cc17f7345c311584e8a5b668154

    SHA1

    0ea89ff33e6b1739fc5199be064cfa0045bc0b97

    SHA256

    5169be6d95bb5e6a75f8a8d736186f9f8059fe3a376f202a0f3b22eedca8881d

    SHA512

    517bec4442e4fc607b746ed49400e0e2ff359a2734c76c606985bed644760c6af9f1738a0b35238091a2660e2d376d0b8887da49eda07ded4ca40014966bbb80

  • memory/648-132-0x0000000000000000-mapping.dmp

  • memory/984-165-0x0000000000000000-mapping.dmp

  • memory/1044-167-0x0000000000000000-mapping.dmp

  • memory/1132-169-0x0000000000000000-mapping.dmp

  • memory/1392-171-0x0000000000000000-mapping.dmp

  • memory/1828-158-0x0000000000000000-mapping.dmp

  • memory/2080-161-0x0000000000000000-mapping.dmp

  • memory/2780-141-0x0000000000000000-mapping.dmp

  • memory/3464-153-0x0000000000000000-mapping.dmp

  • memory/3484-156-0x0000000000000000-mapping.dmp

  • memory/4084-175-0x0000000000000000-mapping.dmp

  • memory/4244-173-0x0000000000000000-mapping.dmp

  • memory/4256-150-0x0000000000000000-mapping.dmp

  • memory/4476-147-0x0000000000000000-mapping.dmp

  • memory/4640-163-0x0000000000000000-mapping.dmp

  • memory/4920-135-0x0000000000000000-mapping.dmp

  • memory/5060-144-0x0000000000000000-mapping.dmp

  • memory/5096-138-0x0000000000000000-mapping.dmp