Analysis

  • max time kernel
    176s
  • max time network
    232s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:56

General

  • Target

    c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe

  • Size

    108KB

  • MD5

    1d380684c8c460ed76bc5e8f0bdb4d06

  • SHA1

    e5952a55b5572cae241e7d2d4322b8f88be9ab76

  • SHA256

    c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387

  • SHA512

    cc6b974175c9dfab9a66acb2b2573468ec7a0d3aed75177af9d339ae352a46149e93278f57b11ed0b80d0962a0580691fdb6340ed2cdb5c28ec96a94c50ee08c

  • SSDEEP

    3072:fNrjKaa7+reA3EdtIMqE1kWEYOIfjm64ZZQ7tF:fNr+ACbYM3TbTfAZZa

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 17 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe
    "C:\Users\Admin\AppData\Local\Temp\c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\reg.exe
      C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmt\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
      2⤵
      • Sets DLL path for service in the registry
      PID:1336
    • C:\Windows\SysWOW64\reg.exe
      C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmtParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\appmgmts.dll" /f
      2⤵
        PID:1248
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\Appinfo\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
        2⤵
        • Sets DLL path for service in the registry
        PID:1496
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppinfoParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\appinfo.dll" /f
        2⤵
          PID:1628
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmt\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
          2⤵
          • Sets DLL path for service in the registry
          PID:1492
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmtParameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
          2⤵
            PID:1240
          • C:\Windows\SysWOW64\reg.exe
            C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\IKEEXT\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
            2⤵
            • Sets DLL path for service in the registry
            PID:792
          • C:\Windows\SysWOW64\reg.exe
            C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\IKEEXTParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\ikeext.dll" /f
            2⤵
              PID:616
            • C:\Windows\SysWOW64\reg.exe
              C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\iphlpsvc\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
              2⤵
              • Sets DLL path for service in the registry
              PID:1400
            • C:\Windows\SysWOW64\reg.exe
              C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\iphlpsvcParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\iphlpsvc.dll" /f
              2⤵
                PID:1108
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\KtmRm\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                2⤵
                • Sets DLL path for service in the registry
                PID:1664
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\KtmRmParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%systemroot%\system32\msdtckrm.dll" /f
                2⤵
                  PID:1780
                • C:\Windows\SysWOW64\reg.exe
                  C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\MSiSCSI\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                  2⤵
                  • Sets DLL path for service in the registry
                  PID:1788
                • C:\Windows\SysWOW64\reg.exe
                  C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\MSiSCSIParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%systemroot%\system32\iscsiexe.dll" /f
                  2⤵
                    PID:1136
                  • C:\Windows\SysWOW64\reg.exe
                    C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\PolicyAgent\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                    2⤵
                    • Sets DLL path for service in the registry
                    PID:964
                  • C:\Windows\SysWOW64\reg.exe
                    C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\PolicyAgentParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\ipsecsvc.dll" /f
                    2⤵
                      PID:944
                    • C:\Windows\SysWOW64\reg.exe
                      C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\RasAuto\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                      2⤵
                      • Sets DLL path for service in the registry
                      PID:1980
                    • C:\Windows\SysWOW64\reg.exe
                      C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\RasAutoParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\rasauto.dll" /f
                      2⤵
                        PID:1728
                      • C:\Windows\SysWOW64\reg.exe
                        C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\RasMan\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                        2⤵
                        • Sets DLL path for service in the registry
                        PID:1076
                      • C:\Windows\SysWOW64\reg.exe
                        C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\RasManParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\rasmans.dll" /f
                        2⤵
                          PID:112
                        • C:\Windows\SysWOW64\reg.exe
                          C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\RemoteAccess\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                          2⤵
                          • Sets DLL path for service in the registry
                          PID:676
                        • C:\Windows\SysWOW64\reg.exe
                          C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\RemoteAccessParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\mprdim.dll" /f
                          2⤵
                            PID:1860
                          • C:\Windows\SysWOW64\reg.exe
                            C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\seclogon\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                            2⤵
                            • Sets DLL path for service in the registry
                            PID:1164
                          • C:\Windows\SysWOW64\reg.exe
                            C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\seclogonParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%windir%\system32\seclogon.dll" /f
                            2⤵
                              PID:812
                            • C:\Windows\SysWOW64\reg.exe
                              C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\SessionEnv\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                              2⤵
                              • Sets DLL path for service in the registry
                              PID:296
                            • C:\Windows\SysWOW64\reg.exe
                              C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\SessionEnvParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\system32\sessenv.dll" /f
                              2⤵
                                PID:1792
                              • C:\Windows\SysWOW64\reg.exe
                                C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                                2⤵
                                • Sets DLL path for service in the registry
                                PID:1616
                              • C:\Windows\SysWOW64\reg.exe
                                C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\SharedAccessParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\ipnathlp.dll" /f
                                2⤵
                                  PID:624
                                • C:\Windows\SysWOW64\reg.exe
                                  C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\TapiSrv\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                                  2⤵
                                  • Sets DLL path for service in the registry
                                  PID:1608
                                • C:\Windows\SysWOW64\reg.exe
                                  C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\TapiSrvParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\tapisrv.dll" /f
                                  2⤵
                                    PID:1900
                                  • C:\Windows\SysWOW64\reg.exe
                                    C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\TermService\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                                    2⤵
                                    • Sets DLL path for service in the registry
                                    PID:1192
                                  • C:\Windows\SysWOW64\reg.exe
                                    C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\TermServiceParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\termsrv.dll" /f
                                    2⤵
                                      PID:1092
                                    • C:\Windows\SysWOW64\reg.exe
                                      C:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\Wecsvc\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f
                                      2⤵
                                      • Sets DLL path for service in the registry
                                      PID:1600
                                  • C:\Windows\SysWOW64\svchost.exe
                                    C:\Windows\SysWOW64\svchost.exe -k netsvcs
                                    1⤵
                                      PID:1888
                                    • C:\Windows\SysWOW64\svchost.exe
                                      C:\Windows\SysWOW64\svchost.exe -k NetworkServiceAndNoImpersonation
                                      1⤵
                                        PID:928
                                      • C:\Windows\SysWOW64\svchost.exe
                                        C:\Windows\SysWOW64\svchost.exe -k netsvcs
                                        1⤵
                                          PID:1876
                                        • C:\Windows\SysWOW64\svchost.exe
                                          C:\Windows\SysWOW64\svchost.exe -k NetworkService
                                          1⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          • Modifies data under HKEY_USERS
                                          PID:1152

                                        Network

                                        MITRE ATT&CK Matrix ATT&CK v6

                                        Persistence

                                        Registry Run Keys / Startup Folder

                                        1
                                        T1060

                                        Defense Evasion

                                        Modify Registry

                                        1
                                        T1112

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • \??\c:\windows\SysWOW64\wbem\cimmentsa.dll
                                          Filesize

                                          37.8MB

                                          MD5

                                          2505322bdc1b43ea2299636bde55acd6

                                          SHA1

                                          2462967be8b632bf45a989462b15488a1d47f1fe

                                          SHA256

                                          2c4b6a33607dca01e4f49c90a3e7c4853bd6a2504b71f7e421aabcd0ebb0e5ba

                                          SHA512

                                          00b1ed960178b2ed6963f0050603526285232a95581f8730837ff880802a7fb51d9017ce20b21a8ea1cef65de952772161fa3002867b14617550ec325b7425af

                                        • \Windows\SysWOW64\wbem\cimmentsa.dll
                                          Filesize

                                          37.8MB

                                          MD5

                                          2505322bdc1b43ea2299636bde55acd6

                                          SHA1

                                          2462967be8b632bf45a989462b15488a1d47f1fe

                                          SHA256

                                          2c4b6a33607dca01e4f49c90a3e7c4853bd6a2504b71f7e421aabcd0ebb0e5ba

                                          SHA512

                                          00b1ed960178b2ed6963f0050603526285232a95581f8730837ff880802a7fb51d9017ce20b21a8ea1cef65de952772161fa3002867b14617550ec325b7425af

                                        • \Windows\SysWOW64\wbem\cimmentsa.dll
                                          Filesize

                                          37.8MB

                                          MD5

                                          2505322bdc1b43ea2299636bde55acd6

                                          SHA1

                                          2462967be8b632bf45a989462b15488a1d47f1fe

                                          SHA256

                                          2c4b6a33607dca01e4f49c90a3e7c4853bd6a2504b71f7e421aabcd0ebb0e5ba

                                          SHA512

                                          00b1ed960178b2ed6963f0050603526285232a95581f8730837ff880802a7fb51d9017ce20b21a8ea1cef65de952772161fa3002867b14617550ec325b7425af

                                        • memory/112-74-0x0000000000000000-mapping.dmp
                                        • memory/296-79-0x0000000000000000-mapping.dmp
                                        • memory/616-62-0x0000000000000000-mapping.dmp
                                        • memory/624-82-0x0000000000000000-mapping.dmp
                                        • memory/676-75-0x0000000000000000-mapping.dmp
                                        • memory/792-61-0x0000000000000000-mapping.dmp
                                        • memory/812-78-0x0000000000000000-mapping.dmp
                                        • memory/944-70-0x0000000000000000-mapping.dmp
                                        • memory/964-69-0x0000000000000000-mapping.dmp
                                        • memory/1076-73-0x0000000000000000-mapping.dmp
                                        • memory/1092-86-0x0000000000000000-mapping.dmp
                                        • memory/1108-64-0x0000000000000000-mapping.dmp
                                        • memory/1136-68-0x0000000000000000-mapping.dmp
                                        • memory/1152-90-0x0000000076651000-0x0000000076653000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/1164-77-0x0000000000000000-mapping.dmp
                                        • memory/1192-85-0x0000000000000000-mapping.dmp
                                        • memory/1240-60-0x0000000000000000-mapping.dmp
                                        • memory/1248-56-0x0000000000000000-mapping.dmp
                                        • memory/1336-55-0x0000000000000000-mapping.dmp
                                        • memory/1400-63-0x0000000000000000-mapping.dmp
                                        • memory/1492-59-0x0000000000000000-mapping.dmp
                                        • memory/1496-57-0x0000000000000000-mapping.dmp
                                        • memory/1600-87-0x0000000000000000-mapping.dmp
                                        • memory/1608-83-0x0000000000000000-mapping.dmp
                                        • memory/1616-81-0x0000000000000000-mapping.dmp
                                        • memory/1628-58-0x0000000000000000-mapping.dmp
                                        • memory/1664-65-0x0000000000000000-mapping.dmp
                                        • memory/1728-72-0x0000000000000000-mapping.dmp
                                        • memory/1780-66-0x0000000000000000-mapping.dmp
                                        • memory/1788-67-0x0000000000000000-mapping.dmp
                                        • memory/1792-80-0x0000000000000000-mapping.dmp
                                        • memory/1860-76-0x0000000000000000-mapping.dmp
                                        • memory/1900-84-0x0000000000000000-mapping.dmp
                                        • memory/1980-71-0x0000000000000000-mapping.dmp