Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2023, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
CompMgmtLauncher.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CompMgmtLauncher.exe
Resource
win10v2004-20230220-en
General
-
Target
CompMgmtLauncher.exe
-
Size
144KB
-
MD5
023a7565f6a6fb90fa666babab598853
-
SHA1
bb95310354b433ddb56bcb2a96d69d14a5caa78f
-
SHA256
650926ff85163cef3288e3f32575851458a45361ade9207dcde3923d22771644
-
SHA512
aa0f74363b19dc6bf1f0671d7d793a28e6523e0bd79a84071d3404c9942719174324189d833dddbaf138c39558735e22a16b53e9486113fe8a08ccee8ffbf808
-
SSDEEP
1536:dECYMyOQif7YO97drDAkwbjZM+AWLDyDssyChrrcx/JyRtH/dGrc+APUfhMjVHCh:BSwdrDApM+AWLDuBNQ/JyRV/Yr7XDf6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation CompMgmtLauncher.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\compmgmt.msc mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CompMgmtLauncher.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings CompMgmtLauncher.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1552 mmc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: 33 1552 mmc.exe Token: SeIncBasePriorityPrivilege 1552 mmc.exe Token: 33 1552 mmc.exe Token: SeIncBasePriorityPrivilege 1552 mmc.exe Token: SeSecurityPrivilege 1552 mmc.exe Token: 33 1552 mmc.exe Token: SeIncBasePriorityPrivilege 1552 mmc.exe Token: 33 1552 mmc.exe Token: SeIncBasePriorityPrivilege 1552 mmc.exe Token: 33 1552 mmc.exe Token: SeIncBasePriorityPrivilege 1552 mmc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4912 mmc.exe 1552 mmc.exe 1552 mmc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4912 4380 CompMgmtLauncher.exe 83 PID 4380 wrote to memory of 4912 4380 CompMgmtLauncher.exe 83 PID 4380 wrote to memory of 4912 4380 CompMgmtLauncher.exe 83 PID 4912 wrote to memory of 1552 4912 mmc.exe 84 PID 4912 wrote to memory of 1552 4912 mmc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\CompMgmtLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CompMgmtLauncher.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\compmgmt.msc" /s2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\compmgmt.msc" "C:\Windows\system32\compmgmt.msc" /s3⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1552
-
-