Analysis
-
max time kernel
171s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 05:59
Static task
static1
Behavioral task
behavioral1
Sample
8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe
Resource
win10v2004-20220812-en
General
-
Target
8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe
-
Size
80KB
-
MD5
b803acee7e3e6b92e1c185a71a81790f
-
SHA1
5ced433c728d0667f3a98689649ed722942f1cc4
-
SHA256
8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625
-
SHA512
e555469b6da31c7c0b0bf611e5110dabc04ed3568137d17c716802f80bdc9b87a1a44c4e86b8d9e50edddc4e36d2c5c16eda8ff76afd18362e118d84ead3f77d
-
SSDEEP
1536:PwEJOVKRytAB0YBIxZcafY6X4RqGGDkTZB7zA6fyMoyt:5stADOcan4UVkjfyMoyt
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SessMgr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sessmgr.exe /waitservice" 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\CmSTP = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\cmstp.exe /waitservice" 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 esentutl.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\.DEFAULT 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\.DEFAULT\Software 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MstInit = "C:\\Users\\Admin\\LOCALS~1\\APPLIC~1\\MICROS~1\\mstinit.exe /waitservice" 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 2736 3100 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe 78 PID 3100 wrote to memory of 2736 3100 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe 78 PID 3100 wrote to memory of 2736 3100 8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe"C:\Users\Admin\AppData\Local\Temp\8f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\LOCALS~1\APPLIC~1\esentutl.exeC:\Users\Admin\LOCALS~1\APPLIC~1\esentutl.exe /waitservice2⤵
- Executes dropped EXE
PID:2736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b803acee7e3e6b92e1c185a71a81790f
SHA15ced433c728d0667f3a98689649ed722942f1cc4
SHA2568f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625
SHA512e555469b6da31c7c0b0bf611e5110dabc04ed3568137d17c716802f80bdc9b87a1a44c4e86b8d9e50edddc4e36d2c5c16eda8ff76afd18362e118d84ead3f77d
-
Filesize
80KB
MD5b803acee7e3e6b92e1c185a71a81790f
SHA15ced433c728d0667f3a98689649ed722942f1cc4
SHA2568f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625
SHA512e555469b6da31c7c0b0bf611e5110dabc04ed3568137d17c716802f80bdc9b87a1a44c4e86b8d9e50edddc4e36d2c5c16eda8ff76afd18362e118d84ead3f77d
-
Filesize
80KB
MD5b803acee7e3e6b92e1c185a71a81790f
SHA15ced433c728d0667f3a98689649ed722942f1cc4
SHA2568f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625
SHA512e555469b6da31c7c0b0bf611e5110dabc04ed3568137d17c716802f80bdc9b87a1a44c4e86b8d9e50edddc4e36d2c5c16eda8ff76afd18362e118d84ead3f77d
-
Filesize
80KB
MD5b803acee7e3e6b92e1c185a71a81790f
SHA15ced433c728d0667f3a98689649ed722942f1cc4
SHA2568f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625
SHA512e555469b6da31c7c0b0bf611e5110dabc04ed3568137d17c716802f80bdc9b87a1a44c4e86b8d9e50edddc4e36d2c5c16eda8ff76afd18362e118d84ead3f77d
-
Filesize
80KB
MD5b803acee7e3e6b92e1c185a71a81790f
SHA15ced433c728d0667f3a98689649ed722942f1cc4
SHA2568f82f055e69813f62374b4d99a75a720ac13721a0359f452bf679292412c2625
SHA512e555469b6da31c7c0b0bf611e5110dabc04ed3568137d17c716802f80bdc9b87a1a44c4e86b8d9e50edddc4e36d2c5c16eda8ff76afd18362e118d84ead3f77d