Analysis
-
max time kernel
4294217s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 18:25
Static task
static1
Behavioral task
behavioral1
Sample
dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe
Resource
win10v2004-en-20220113
General
-
Target
dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe
-
Size
78KB
-
MD5
d20090c79abb96f344068613e31b6128
-
SHA1
e337f9f25ca800108d0252d7cafa2595886ea71e
-
SHA256
dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be
-
SHA512
5360b368753268e233bbe07529d6adda4a09f552e6fedc3eb1f93c98f165f8413d10985fab7614a24a81c7f2a904622ceabda8459fd4df72356b4b2845b1faf6
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp6C1B.tmp.exepid process 888 tmp6C1B.tmp.exe -
Deletes itself 1 IoCs
Processes:
tmp6C1B.tmp.exepid process 888 tmp6C1B.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exepid process 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exedescription pid process Token: SeDebugPrivilege 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exevbc.exedescription pid process target process PID 1996 wrote to memory of 1636 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe vbc.exe PID 1996 wrote to memory of 1636 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe vbc.exe PID 1996 wrote to memory of 1636 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe vbc.exe PID 1996 wrote to memory of 1636 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe vbc.exe PID 1636 wrote to memory of 468 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 468 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 468 1636 vbc.exe cvtres.exe PID 1636 wrote to memory of 468 1636 vbc.exe cvtres.exe PID 1996 wrote to memory of 888 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe tmp6C1B.tmp.exe PID 1996 wrote to memory of 888 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe tmp6C1B.tmp.exe PID 1996 wrote to memory of 888 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe tmp6C1B.tmp.exe PID 1996 wrote to memory of 888 1996 dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe tmp6C1B.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe"C:\Users\Admin\AppData\Local\Temp\dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a1xwdqf6.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6E1F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6E0F.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp6C1B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6C1B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\dad553fe1ab3a4ca501fe1aa9f61e8e957d66955e9aa4164ee9976817d07e0be.exe2⤵
- Executes dropped EXE
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES6E1F.tmpFilesize
1KB
MD5284f486b0ea8307615c0efe00e9fc9d8
SHA115c3fb4f13fd9c54bbd4594e1c0fb085dbfe88a2
SHA2560d91790ddaad8b82c73d711c67676c689e4324752fd2cc1ecf591dd313aaf911
SHA512e8909d1b4eaa7742bd6cd6a53a7a8d4d9ba9cc46e03222ba077effc282052233612255d6121e2d0d1ec53305c7599adef6646d50dadb57ddb4d750bb58d28f05
-
C:\Users\Admin\AppData\Local\Temp\a1xwdqf6.0.vbFilesize
14KB
MD528e12a6013e59e47d78a6aa1694f0961
SHA1c9403321f9008eeca8303e1b13f0444bfa4d844b
SHA256596e3eae58103f0c44a50edc61afc1afeae10a6ae677759c2a27ec0484f856f5
SHA512e09286da5e3f4a16b21f190eb6310f8ba863e4ad99a01bae085e6707e1db487bde78fdc493162bb089b255d5fab61d1c53c6987f600e5b70ba346359070b199f
-
C:\Users\Admin\AppData\Local\Temp\a1xwdqf6.cmdlineFilesize
266B
MD546cd6e1395569f50026122c73d30517a
SHA1f52a723558743ebaae85d7159c954b6a8b36c45f
SHA2563e6044dcab12f95cd4db5c1a8014ae35c7534107abb05f90af5539498076c9af
SHA51219aaf7225835270a1a4b07091d2443bcdf44c2838cd5a90b3d09b46e860a1bb1391d68433c02ffe827d27f116a0f4af900e7e0c25f497ec8dda2f8de4f58586c
-
C:\Users\Admin\AppData\Local\Temp\tmp6C1B.tmp.exeFilesize
78KB
MD5f0d1a4a80ccd6822a0270caf35cd9ff6
SHA117b21d9a53a68980f06d3a829c38ca4d8ec5e02b
SHA2567631097ce1baac815509014d72796a55174eef3d33d1efb2674837266bd9c9f3
SHA512e6995c356c0c26fcb5135c3ccbcd4975ebb173ddca358b58d841fd0f46dfe43c4d4c739fbe19a5ba2c7909a8014e9359afa9d27e0745e45e3be746d0372875b0
-
C:\Users\Admin\AppData\Local\Temp\tmp6C1B.tmp.exeFilesize
78KB
MD5f0d1a4a80ccd6822a0270caf35cd9ff6
SHA117b21d9a53a68980f06d3a829c38ca4d8ec5e02b
SHA2567631097ce1baac815509014d72796a55174eef3d33d1efb2674837266bd9c9f3
SHA512e6995c356c0c26fcb5135c3ccbcd4975ebb173ddca358b58d841fd0f46dfe43c4d4c739fbe19a5ba2c7909a8014e9359afa9d27e0745e45e3be746d0372875b0
-
C:\Users\Admin\AppData\Local\Temp\vbc6E0F.tmpFilesize
660B
MD58e9bf80ed79139d481a787b2dbc1f30a
SHA18006c210289289712e3df576e315f5cf5271b916
SHA25609c60ef344ae9ed0e9e10a4701aa7e88d8523b70ecf965b8e5319386a659757b
SHA512bfe330792f8668ec646f7e1cddef67ca6bc50b862d43b403bd6e88bd8589dfdbbb63a1f0fc9f14f9a209e57a6951d14d82c314bae262f18534fcf414941e4dcc
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5484967ab9def8ff17dd55476ca137721
SHA1a84012f673fe1ac9041e7827cc3de4b20a1194e2
SHA2569c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b
SHA5121e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7
-
\Users\Admin\AppData\Local\Temp\tmp6C1B.tmp.exeFilesize
78KB
MD5f0d1a4a80ccd6822a0270caf35cd9ff6
SHA117b21d9a53a68980f06d3a829c38ca4d8ec5e02b
SHA2567631097ce1baac815509014d72796a55174eef3d33d1efb2674837266bd9c9f3
SHA512e6995c356c0c26fcb5135c3ccbcd4975ebb173ddca358b58d841fd0f46dfe43c4d4c739fbe19a5ba2c7909a8014e9359afa9d27e0745e45e3be746d0372875b0
-
\Users\Admin\AppData\Local\Temp\tmp6C1B.tmp.exeFilesize
78KB
MD5f0d1a4a80ccd6822a0270caf35cd9ff6
SHA117b21d9a53a68980f06d3a829c38ca4d8ec5e02b
SHA2567631097ce1baac815509014d72796a55174eef3d33d1efb2674837266bd9c9f3
SHA512e6995c356c0c26fcb5135c3ccbcd4975ebb173ddca358b58d841fd0f46dfe43c4d4c739fbe19a5ba2c7909a8014e9359afa9d27e0745e45e3be746d0372875b0
-
memory/468-60-0x0000000000000000-mapping.dmp
-
memory/888-66-0x0000000000000000-mapping.dmp
-
memory/888-69-0x0000000074190000-0x000000007473B000-memory.dmpFilesize
5.7MB
-
memory/888-70-0x0000000000615000-0x0000000000626000-memory.dmpFilesize
68KB
-
memory/1636-56-0x0000000000000000-mapping.dmp
-
memory/1996-54-0x0000000074C61000-0x0000000074C63000-memory.dmpFilesize
8KB
-
memory/1996-55-0x0000000074200000-0x00000000747AB000-memory.dmpFilesize
5.7MB