Analysis
-
max time kernel
178s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:56
Static task
static1
Behavioral task
behavioral1
Sample
c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe
Resource
win10v2004-20221111-en
General
-
Target
c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe
-
Size
108KB
-
MD5
1d380684c8c460ed76bc5e8f0bdb4d06
-
SHA1
e5952a55b5572cae241e7d2d4322b8f88be9ab76
-
SHA256
c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387
-
SHA512
cc6b974175c9dfab9a66acb2b2573468ec7a0d3aed75177af9d339ae352a46149e93278f57b11ed0b80d0962a0580691fdb6340ed2cdb5c28ec96a94c50ee08c
-
SSDEEP
3072:fNrjKaa7+reA3EdtIMqE1kWEYOIfjm64ZZQ7tF:fNr+ACbYM3TbTfAZZa
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AppMgmt\Parameters\ServiceDll = "C:\\Windows\\system32\\wbem\\cimmentsa.dll" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Appinfo\Parameters\ServiceDll = "C:\\Windows\\system32\\wbem\\cimmentsa.dll" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AppMgmt\Parameters\ServiceDll = "C:\\Windows\\system32\\wbem\\cimmentsa.dll" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DmEnrollmentSvc\Parameters\ServiceDll = "C:\\Windows\\system32\\wbem\\cimmentsa.dll" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exepid process 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe -
Drops file in System32 directory 1 IoCs
Processes:
c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exedescription ioc process File created C:\Windows\SysWOW64\wbem\cimmentsa.dll c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exedescription pid process target process PID 1644 wrote to memory of 1964 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1964 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1964 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 3324 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 3324 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 3324 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1468 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1468 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1468 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 4092 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 4092 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 4092 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1848 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1848 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 1848 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 4520 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 4520 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 4520 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 3724 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 3724 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe PID 1644 wrote to memory of 3724 1644 c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe"C:\Users\Admin\AppData\Local\Temp\c87f6b1c5b5d426cdaadd06b982fb0e046d3b415aa842213de20adfa2e5f1387.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmt\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f2⤵
- Sets DLL path for service in the registry
PID:1964 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmtParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\appmgmts.dll" /f2⤵PID:3324
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\Appinfo\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f2⤵
- Sets DLL path for service in the registry
PID:1468 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppinfoParameters" /v ServiceDll /t REG_EXPAND_SZ /d "%SystemRoot%\System32\appinfo.dll" /f2⤵PID:4092
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmt\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f2⤵
- Sets DLL path for service in the registry
PID:1848 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\AppMgmtParameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f2⤵PID:4520
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\DmEnrollmentSvc\Parameters" /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\system32\wbem\cimmentsa.dll" /f2⤵
- Sets DLL path for service in the registry
PID:3724
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2852
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -p1⤵PID:4968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40.3MB
MD5f764206d60157ed2310d0738af1c36df
SHA1f43bb23a49992ee3331d66ffe97566a1f4b384bb
SHA25607ed6da212fa0d328353178e25708bdc3f41775e0d9ce4cd13ea5785b7027bb5
SHA51261f55efcff5b886baaa22caddc9ac88143f713c5be1f2bd69c481dfe5367af73b45bae4ecaf081f94169dee105fcb6377a81a81271627d28da2bf6c8fd1bac85