Analysis
-
max time kernel
4294223s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
29-03-2022 16:41
Static task
static1
Behavioral task
behavioral1
Sample
d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe
Resource
win10v2004-20220310-en
General
-
Target
d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe
-
Size
78KB
-
MD5
05b780bea5526c3e73d9a33070fda7af
-
SHA1
7e9414b2b904606559d76e72547c931032f2f053
-
SHA256
d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe
-
SHA512
83ad5d9a4e65844bdf962d1c00391ffe24e98cb96ca41fba706076196c7ab4596bf132e935bfea4738b5da174f272c9d449b06994ca9dfc27142b45e1c477921
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp6171.tmp.exepid process 1604 tmp6171.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exepid process 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp6171.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp6171.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exetmp6171.tmp.exedescription pid process Token: SeDebugPrivilege 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe Token: SeDebugPrivilege 1604 tmp6171.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exevbc.exedescription pid process target process PID 2020 wrote to memory of 968 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe vbc.exe PID 2020 wrote to memory of 968 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe vbc.exe PID 2020 wrote to memory of 968 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe vbc.exe PID 2020 wrote to memory of 968 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe vbc.exe PID 968 wrote to memory of 764 968 vbc.exe cvtres.exe PID 968 wrote to memory of 764 968 vbc.exe cvtres.exe PID 968 wrote to memory of 764 968 vbc.exe cvtres.exe PID 968 wrote to memory of 764 968 vbc.exe cvtres.exe PID 2020 wrote to memory of 1604 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe tmp6171.tmp.exe PID 2020 wrote to memory of 1604 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe tmp6171.tmp.exe PID 2020 wrote to memory of 1604 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe tmp6171.tmp.exe PID 2020 wrote to memory of 1604 2020 d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe tmp6171.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe"C:\Users\Admin\AppData\Local\Temp\d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\aw3_2yg2.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES62AA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc62A9.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp6171.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6171.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d7b1c60139b208a733e00ee9661f17379e6dab8b5d0e26e7b5f54479f5a6cafe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES62AA.tmpFilesize
1KB
MD53cc8cb130f3ab08ce44b0c2651db5a71
SHA1ca24a5303cada582259f76fd86b90fc96479822a
SHA2562f34cd0e0b2ee47b11c6053ed749b08026339ed0301360936e674549cefdc5f6
SHA512ed4c2e0d20e530afc3d9fc3d4795b4d4e43062a1080b454c6d3c4f14f86a80f510e5a8f11946413b2f8ffe580319128485759a3cae67ac23f450b29692fd80cb
-
C:\Users\Admin\AppData\Local\Temp\aw3_2yg2.0.vbFilesize
15KB
MD5b72235c704fd9a62d7ad0a720f55476a
SHA18bef728ab93ffca12ddf03b7126a52741c957d75
SHA256415db721bb8fd1351f9f58e7758f3acd21f0525afed8d1f6c24a1392c820605e
SHA5129a9d89b08b198a5ebfe155903f737b7f6414a9ca950e52c6271c73bb058ee3b1cade97aa10215cbc325e0738388eec8037f1a8e4dabedc6c676096ea21dce8a1
-
C:\Users\Admin\AppData\Local\Temp\aw3_2yg2.cmdlineFilesize
266B
MD5f37f2d4ff047032073ace3630aa4203e
SHA108145b49cd3a868c2137709b6cab68fc07b3e6d5
SHA2568a316f05f59402566a069b72d610b30f014600475c32411fa17e8093bcb02ab1
SHA51286fd6573c9b2e284dd80d51a5da3c545cb25f4e70dbca8816e08f408471bbb5b5a3aee1afd37fb62bc45d6815af22f6e701667556c2e7bf083f86c127cae5daf
-
C:\Users\Admin\AppData\Local\Temp\tmp6171.tmp.exeFilesize
78KB
MD5a47579cc481cc7f9528791ec622f2d85
SHA1499efcf2d8e7dfcf366bb7fd8622847f1fddc02c
SHA2568797e098d8e1b2f9fa14ad133a3a21cb1274079e2726ea9be7df1e9300c63c44
SHA51289652b5c36d4687200c9d92ffc738744f4679b048d7c335f6be6622d1ad992fb6d3493fddcff9790a88b170961d140f6f21911a006ab8bc9f99c5f76c6ea2f3c
-
C:\Users\Admin\AppData\Local\Temp\tmp6171.tmp.exeFilesize
78KB
MD5a47579cc481cc7f9528791ec622f2d85
SHA1499efcf2d8e7dfcf366bb7fd8622847f1fddc02c
SHA2568797e098d8e1b2f9fa14ad133a3a21cb1274079e2726ea9be7df1e9300c63c44
SHA51289652b5c36d4687200c9d92ffc738744f4679b048d7c335f6be6622d1ad992fb6d3493fddcff9790a88b170961d140f6f21911a006ab8bc9f99c5f76c6ea2f3c
-
C:\Users\Admin\AppData\Local\Temp\vbc62A9.tmpFilesize
660B
MD5671565a157d7eacadbb962fcb59d7745
SHA1616c4bb9b31401ee4ffcb229d5a115f02d4c7b92
SHA25667a676bcfe0c44ed866ab65e894ecf38479e6e54146e1950e2bea110f26420f0
SHA512e8ea389d80e6a8a3bde7ebc3f5d2e979e37f6504846a82fdb7df39341ff2bb78b682fa76dffdf79be4ec54902839a15f644b91fda2a863dd70b5f35c2530b7b5
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
\Users\Admin\AppData\Local\Temp\tmp6171.tmp.exeFilesize
78KB
MD5a47579cc481cc7f9528791ec622f2d85
SHA1499efcf2d8e7dfcf366bb7fd8622847f1fddc02c
SHA2568797e098d8e1b2f9fa14ad133a3a21cb1274079e2726ea9be7df1e9300c63c44
SHA51289652b5c36d4687200c9d92ffc738744f4679b048d7c335f6be6622d1ad992fb6d3493fddcff9790a88b170961d140f6f21911a006ab8bc9f99c5f76c6ea2f3c
-
\Users\Admin\AppData\Local\Temp\tmp6171.tmp.exeFilesize
78KB
MD5a47579cc481cc7f9528791ec622f2d85
SHA1499efcf2d8e7dfcf366bb7fd8622847f1fddc02c
SHA2568797e098d8e1b2f9fa14ad133a3a21cb1274079e2726ea9be7df1e9300c63c44
SHA51289652b5c36d4687200c9d92ffc738744f4679b048d7c335f6be6622d1ad992fb6d3493fddcff9790a88b170961d140f6f21911a006ab8bc9f99c5f76c6ea2f3c
-
memory/764-59-0x0000000000000000-mapping.dmp
-
memory/968-55-0x0000000000000000-mapping.dmp
-
memory/1604-65-0x0000000000000000-mapping.dmp
-
memory/1604-68-0x0000000074240000-0x00000000747EB000-memory.dmpFilesize
5.7MB
-
memory/1604-70-0x0000000000AB5000-0x0000000000AC6000-memory.dmpFilesize
68KB
-
memory/2020-54-0x0000000075271000-0x0000000075273000-memory.dmpFilesize
8KB
-
memory/2020-69-0x0000000074240000-0x00000000747EB000-memory.dmpFilesize
5.7MB