Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 04:14
Static task
static1
Behavioral task
behavioral1
Sample
533a7dbf86c09faa41582c2667704d6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
533a7dbf86c09faa41582c2667704d6a.exe
Resource
win10v2004-20231215-en
General
-
Target
533a7dbf86c09faa41582c2667704d6a.exe
-
Size
60KB
-
MD5
533a7dbf86c09faa41582c2667704d6a
-
SHA1
8d02c26bd9964f61659d7e7bbd10b9a18f6f9bdb
-
SHA256
cff2688925162938aece0c55ffa49b346d8bd5cab177c8d4250befbd098d0536
-
SHA512
ed94fce2c35d33e7cb19903f990dc0c2573b8880ab1ae14574869a0df28e3658f1f95f538c41202ce77bcefc7986ed0300b6cb40219ffac92d3e19de46eddf4d
-
SSDEEP
1536:adrC+sr5GfbQ26SvrFrlLXtwrUidKbRt:yfbQUrFpLgdKlt
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 533a7dbf86c09faa41582c2667704d6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\CmSTP = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\cmstp.exe /waitservice" 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 533a7dbf86c09faa41582c2667704d6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MstInit = "C:\\Users\\Admin\\LOCALS~1\\APPLIC~1\\MICROS~1\\mstinit.exe /waitservice" 533a7dbf86c09faa41582c2667704d6a.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\mstinit.exe 533a7dbf86c09faa41582c2667704d6a.exe File created C:\Windows\SysWOW64\drivers\comrepl.exe ieudinit.exe File opened for modification C:\Windows\SysWOW64\drivers\comrepl.exe ieudinit.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 ieudinit.exe -
Loads dropped DLL 2 IoCs
pid Process 2264 533a7dbf86c09faa41582c2667704d6a.exe 2264 533a7dbf86c09faa41582c2667704d6a.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 533a7dbf86c09faa41582c2667704d6a.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MstInit = "C:\\Windows\\System32\\drivers\\mstinit.exe /waitservice" 533a7dbf86c09faa41582c2667704d6a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2292 2264 533a7dbf86c09faa41582c2667704d6a.exe 28 PID 2264 wrote to memory of 2292 2264 533a7dbf86c09faa41582c2667704d6a.exe 28 PID 2264 wrote to memory of 2292 2264 533a7dbf86c09faa41582c2667704d6a.exe 28 PID 2264 wrote to memory of 2292 2264 533a7dbf86c09faa41582c2667704d6a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\533a7dbf86c09faa41582c2667704d6a.exe"C:\Users\Admin\AppData\Local\Temp\533a7dbf86c09faa41582c2667704d6a.exe"1⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\ieudinit.exeC:\Users\Admin\AppData\Roaming\ieudinit.exe /waitservice2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5533a7dbf86c09faa41582c2667704d6a
SHA18d02c26bd9964f61659d7e7bbd10b9a18f6f9bdb
SHA256cff2688925162938aece0c55ffa49b346d8bd5cab177c8d4250befbd098d0536
SHA512ed94fce2c35d33e7cb19903f990dc0c2573b8880ab1ae14574869a0df28e3658f1f95f538c41202ce77bcefc7986ed0300b6cb40219ffac92d3e19de46eddf4d