Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe
Resource
win10v2004-20231215-en
General
-
Target
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe
-
Size
196KB
-
MD5
b70aaa5c8c7dd1d5d57649b601127693
-
SHA1
745598aa07e6c4541747c57ad52e604a9cbbd02d
-
SHA256
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae
-
SHA512
869e9b82b4ae1d72e91acaa36d9c077e604f731370ac8124a8d3c8b8cb9b3bd4041dafedcb2b7f3c86d3e4dbfb5bd1777d69e9de1ba0ce4c8404f9aeaecd9def
-
SSDEEP
3072:c29+hIl2epp1q5GWp1icKAArDZz4N9GhbkrNEk1wgXDnsZH4lLsEff/J:DwAwp0yN90QEhiwZH4lQEff/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log cmstp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2716 reg.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe Token: SeRestorePrivilege 2708 cmstp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2708 1220 404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe 28 PID 1220 wrote to memory of 2708 1220 404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe 28 PID 1220 wrote to memory of 2708 1220 404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe 28 PID 2708 wrote to memory of 2716 2708 cmstp.exe 29 PID 2708 wrote to memory of 2716 2708 cmstp.exe 29 PID 2708 wrote to memory of 2716 2708 cmstp.exe 29 PID 2708 wrote to memory of 2520 2708 cmstp.exe 31 PID 2708 wrote to memory of 2520 2708 cmstp.exe 31 PID 2708 wrote to memory of 2520 2708 cmstp.exe 31 PID 2520 wrote to memory of 2600 2520 cmd.exe 33 PID 2520 wrote to memory of 2600 2520 cmd.exe 33 PID 2520 wrote to memory of 2600 2520 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe"C:\Users\Admin\AppData\Local\Temp\404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\cmstp.execmstp.exe /s /su /ns 90ff0063-d143-484d-a0a6-51a6491b859e.inf2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP\13 /v SelectSelfSignedCert /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:2716
-
-
C:\Windows\system32\cmd.execmd.exe /c certutil -addstore root %APPDATA%\Microsoft\Network\Connections\Cm\90ff0063-d143-484d-a0a6-51a6491b859e\90ff0063-d143-484d-a0a6-51a6491b859e.cer3⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\certutil.execertutil -addstore root C:\Users\Admin\AppData\Roaming\Microsoft\Network\Connections\Cm\90ff0063-d143-484d-a0a6-51a6491b859e\90ff0063-d143-484d-a0a6-51a6491b859e.cer4⤵PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
947B
MD579e4a9840d7d3a96d7c04fe2434c892e
SHA1a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c5436
SHA2564348a0e9444c78cb265e058d5e8944b4d84f9662bd26db257f8934a443c70161
SHA51253b444e565183201a61eeb461209b2dc30895eeca487238d15a026735f229a819e5b19cbd7e2fa2768ab2a64f6ebcd9d1e721341c9ed5dd09fc0d5e43d68bca7
-
Filesize
3KB
MD57cd5b9bbe008d81f84f880e8ba71f3bf
SHA1674c66716a5cbc82da7878749df3934a2f562465
SHA256f3be58c2d4f47c5aca38b5441b46f91adcb7aca7bc3ed9f78bc7b65c547ec30e
SHA5126808e55833c871abd71cdca86afd15acd0a77fa61fc16bd9fdbb8ea9f6feffd3010688b08e6ba4d971920febd7a2eabb753538b1c1cd63516cb29d24b2c5b675
-
Filesize
2KB
MD55dc96019532490b4aabccf795f5235eb
SHA1a135776f4f764fc118e7f15ea1ae27de8bc352bf
SHA2561a50dd39ac81b518edbd573d2cbe44caa0ab9e1c6e3a34577a9faaa30b3a2c2c
SHA51201bcd14d9269db4c9a13cad49c4e013c621196cf4ba056e3308b43e2e6a50f12dd9f7d13eea63f47de7cb2a58b62ecd622a53fba8ff94e0b8b54b0ac681f0e84
-
Filesize
155B
MD55763171df77c499d4d6bad16f9fdcca1
SHA1607e6ef33d11bbd99f7a0a9ffe11a77861944711
SHA25646dad93a142549ffb4674948e90335036e2535da30eb85262bd14e427557c8ea
SHA5122cc536ec4d69e82cb27bffacadf0c9379aa783a27cea734d4383cb325371c257c74b94364d33f7301293a76bdbf7e0eec769f7472ae6a7dc29df5c32171be89b
-
Filesize
11KB
MD5d62b6c2546efc256ba2ee92720e174eb
SHA108193eef8a9269dc0d9a257903d12d43fd829a44
SHA256808006b3591bbc8094bf00b2c3334578e3b5ae5f915113377f55e20acdf431f1
SHA51230bd8e360ea38e0618ce0b4ee93c2b1af6678e84f7445d1a207e320034ea2b10a0bceae740e7a9f03e8d78d0d192c5fa8e5b1822debebc594955b68fcd2be5a2
-
Filesize
5KB
MD5f4210677849c93e4550b23c038b251f8
SHA1eed0197ea0ec7b79d10dfe38699b5dcc57775b7b
SHA2561ebdce9e839099060b4a68dad683bd77ccb398280ce6ceade6297d50df1001e0
SHA5127fd327fd662c0aa9431f32f8f15708876b4d0b00dfa2c0f191a88aafc3d725da068752dd8f5705c356f20248c3c3588357c60733a4a9a346ce41710c44193943
-
Filesize
4KB
MD51e633ec56eee97f7cd80316388f0b769
SHA125e18aa13520605f17eaf2f9d77acd8ba5408fe2
SHA25604aab375e08f56cf4be4ca7e148969fa93789886eff1b13ab85f00a76cea238e
SHA5124c3edbcd34100d3358b924452a9041ed97fe31df65f6f29d350b17664324edac03fef4d24c995bb2b082c63ce21f9e6833c8474e1549dc5c21f911d12925a824
-
Filesize
135KB
MD5745a3d9dcb4735518fd16ca5dc00c79f
SHA15c9ca1e8f3d81b40a0e6e731171b83f04782e799
SHA256f738942f441272f364d480d700a2215180f0e9765ac64056991b78f0af35d560
SHA512603cbc81fea84a0b612f8129575bedec1710dbfad7d8955afcd2720827923ffdec48852449a73a4ad2bb6332a76a559eec897d68a415bb37f5b39b1ee23a5fde
-
Filesize
44KB
MD597a1be58e3c15fc1fa364382611c1e0d
SHA1196d981be87040921200f59c341095d4fcdaeb58
SHA256dd457e87e1bda9518e37408fa0f4f578bc83aa557b913f09ae610e22e4b3df35
SHA5128dde1e91f8c463d214b4d1a7dc3873d5fe540758ee8515894275c98a53960bfac1d98f249941f25b88c0fc321d94c1fffc6563acdef2213bf1f4c8a311ed9d95
-
Filesize
138B
MD53e4cf7d368e21d61dc926e5fa0309115
SHA1976401ef3d1542b05ae4ebada2c9539d40b729b6
SHA256f4f284e6407b3a69495c3bc8d6ba14d92804fd9ed9b5e6f7d807eadb530eaa02
SHA512c1b54353fc7558dc7480aaf6a739ef526ec356ea78478dc3308669ac875c56693cdaa267fbfdd3e7a52ed4f41f8261102da919a094a5293a10021a3c3d6c412a