Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:43
Static task
static1
Behavioral task
behavioral1
Sample
67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe
Resource
win10v2004-20220812-en
General
-
Target
67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe
-
Size
139KB
-
MD5
d1953176c75554cde4565d5a41650c61
-
SHA1
982a321d3f4ab6c8ca657719bcd265e6761e1cd3
-
SHA256
67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35
-
SHA512
85922ba0f4001f3cebd9f35ee2ad0548c5f5fd0ee2a6d0b07a8420c6adbeed71b5745faf5127232a17c936fea7863046b633477272d74bf8a2e3ec28137248f2
-
SSDEEP
3072:4KYHzAuzeCeW51ThnftcwaSOfepQo8whnOKexYy6zgF2:hC0CeWTZeMOO8w1OazgF2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
smncs.exepid process 4928 smncs.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
Processes:
67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exesmncs.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools smncs.exe -
Drops file in Windows directory 2 IoCs
Processes:
67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exedescription ioc process File created C:\Windows\smncs.exe 67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe File opened for modification C:\Windows\smncs.exe 67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
smncs.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" smncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" smncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" smncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" smncs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ smncs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe"C:\Users\Admin\AppData\Local\Temp\67f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35.exe"1⤵
- Looks for VMWare Tools registry key
- Drops file in Windows directory
PID:3140
-
C:\Windows\smncs.exe"C:\Windows\smncs.exe"1⤵
- Executes dropped EXE
- Looks for VMWare Tools registry key
- Modifies data under HKEY_USERS
PID:4928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5d1953176c75554cde4565d5a41650c61
SHA1982a321d3f4ab6c8ca657719bcd265e6761e1cd3
SHA25667f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35
SHA51285922ba0f4001f3cebd9f35ee2ad0548c5f5fd0ee2a6d0b07a8420c6adbeed71b5745faf5127232a17c936fea7863046b633477272d74bf8a2e3ec28137248f2
-
Filesize
139KB
MD5d1953176c75554cde4565d5a41650c61
SHA1982a321d3f4ab6c8ca657719bcd265e6761e1cd3
SHA25667f022d2e02a41e685aef6d1ab4abfcb91286fb157c47de85f9dc973d9cf5c35
SHA51285922ba0f4001f3cebd9f35ee2ad0548c5f5fd0ee2a6d0b07a8420c6adbeed71b5745faf5127232a17c936fea7863046b633477272d74bf8a2e3ec28137248f2