Analysis
-
max time kernel
4294211s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
29-03-2022 17:41
Static task
static1
Behavioral task
behavioral1
Sample
d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe
Resource
win10v2004-en-20220113
General
-
Target
d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe
-
Size
78KB
-
MD5
000d208397403014c9e7aec35aac19dd
-
SHA1
c4dca805a58e53c558edb979b834357ddc31b48b
-
SHA256
d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef
-
SHA512
7193251e0422e150f85397bd484c598582c8a39cac80f2412d3263fbbc400fe0aa875dff95c1459f8e88ca0a987a1c302405e6d250bfa175e6f8c8777b853c6e
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Executes dropped EXE 1 IoCs
Processes:
tmp4F96.tmp.exepid process 832 tmp4F96.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exepid process 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp4F96.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp4F96.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exetmp4F96.tmp.exedescription pid process Token: SeDebugPrivilege 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe Token: SeDebugPrivilege 832 tmp4F96.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exevbc.exedescription pid process target process PID 1040 wrote to memory of 1952 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe vbc.exe PID 1040 wrote to memory of 1952 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe vbc.exe PID 1040 wrote to memory of 1952 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe vbc.exe PID 1040 wrote to memory of 1952 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe vbc.exe PID 1952 wrote to memory of 1876 1952 vbc.exe cvtres.exe PID 1952 wrote to memory of 1876 1952 vbc.exe cvtres.exe PID 1952 wrote to memory of 1876 1952 vbc.exe cvtres.exe PID 1952 wrote to memory of 1876 1952 vbc.exe cvtres.exe PID 1040 wrote to memory of 832 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe tmp4F96.tmp.exe PID 1040 wrote to memory of 832 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe tmp4F96.tmp.exe PID 1040 wrote to memory of 832 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe tmp4F96.tmp.exe PID 1040 wrote to memory of 832 1040 d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe tmp4F96.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe"C:\Users\Admin\AppData\Local\Temp\d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\d2ufypee.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES510E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc50FD.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d054668263e33a0e341c2679ac3b2aa6233b3d2aa8975baeb743d3f9fdbb73ef.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES510E.tmpFilesize
1KB
MD53f7b1d36ab1257f58dccbcbd9e6b7044
SHA10d7275dcf69ff340584642adb096bf5d0d469b4e
SHA2566e36b509325e1d40aa4031ecd1c071ee374d0cc83f94808fc9e94fd4cb6846c9
SHA5125c4fef791e4c9a788fd6ced25688957d0bf21a13b0818d3fa8a3676f57c5b0371981b2af943d1fab797ce77a0a1bda14c13bc06d00426ffd30d5b84e5b1ca39e
-
C:\Users\Admin\AppData\Local\Temp\d2ufypee.0.vbFilesize
14KB
MD5f5ea4a3dd401d175904af04b92b46f0f
SHA1aa73355ccad908afda8edc7c844a766c09ee83be
SHA256660b8b75cf5f977e863a3e75296c02f083af6185c18cbeac2ffece44a9cb4513
SHA512481cf4c7ac71900b9d38daa7e63776e09a51180eda9187037bd90baf12ced4695b85ec8e3b410c11cf3c3530806b7905ab6bd1c6fd7d682ec5cd026164d29ea7
-
C:\Users\Admin\AppData\Local\Temp\d2ufypee.cmdlineFilesize
266B
MD58a107030b525708e8a649e1c9cd3be18
SHA1ad87bc7ed4eae3997da99569dcc70e4b4a38c26f
SHA256ece3651fe2a6d140ba39b041bb0c24b00dd6b960e58309bc5eff6376e60e1b3e
SHA512cfe5adc95b7ccec8cb5e3362a08aa7e9633346ef5b77b545300a586759d9a819040611e8b6721f391a519a4d3c6eb4bc8f7266c613007884b8b4d17d8ad66c3f
-
C:\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.exeFilesize
78KB
MD5339438041da1293f962a862d0d619906
SHA127d3a4f9ced49cc3c31711418ba5fcd1cc4cca64
SHA256762f7d547339aa32cd3a9b797884e550bcb38c5cde7dece03849110a0befcfcd
SHA5121f221bc1416642daafc15c14bb1a5886309c9962ffb413756e69c4445e7f44bf49cf54dcb86e69efbc0ee3028d2ceabc78f7b16692f4ab928c8541a1495912fb
-
C:\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.exeFilesize
78KB
MD5339438041da1293f962a862d0d619906
SHA127d3a4f9ced49cc3c31711418ba5fcd1cc4cca64
SHA256762f7d547339aa32cd3a9b797884e550bcb38c5cde7dece03849110a0befcfcd
SHA5121f221bc1416642daafc15c14bb1a5886309c9962ffb413756e69c4445e7f44bf49cf54dcb86e69efbc0ee3028d2ceabc78f7b16692f4ab928c8541a1495912fb
-
C:\Users\Admin\AppData\Local\Temp\vbc50FD.tmpFilesize
660B
MD5d85a1fc42ddaeafbdb696e4fc7e072b8
SHA19aeadda70a906f7b2a7baff8d34375b8f0c56b54
SHA25666b34b00a185d07e702d19f8fab2c3f6fc9cb88651fe7751ee3d70378fe32753
SHA512cad66a0b5499ee0cffa43adf26219a771cd44eb396f29bbd59eb36ef8e3b1c1e4f68a9a1cf0e0ca0cbad4ee7b8216a80abfee43fd9c61b0851f1daa93c8ca029
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.exeFilesize
78KB
MD5339438041da1293f962a862d0d619906
SHA127d3a4f9ced49cc3c31711418ba5fcd1cc4cca64
SHA256762f7d547339aa32cd3a9b797884e550bcb38c5cde7dece03849110a0befcfcd
SHA5121f221bc1416642daafc15c14bb1a5886309c9962ffb413756e69c4445e7f44bf49cf54dcb86e69efbc0ee3028d2ceabc78f7b16692f4ab928c8541a1495912fb
-
\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.exeFilesize
78KB
MD5339438041da1293f962a862d0d619906
SHA127d3a4f9ced49cc3c31711418ba5fcd1cc4cca64
SHA256762f7d547339aa32cd3a9b797884e550bcb38c5cde7dece03849110a0befcfcd
SHA5121f221bc1416642daafc15c14bb1a5886309c9962ffb413756e69c4445e7f44bf49cf54dcb86e69efbc0ee3028d2ceabc78f7b16692f4ab928c8541a1495912fb
-
memory/832-65-0x0000000000000000-mapping.dmp
-
memory/832-69-0x0000000074090000-0x000000007463B000-memory.dmpFilesize
5.7MB
-
memory/832-70-0x0000000000A15000-0x0000000000A26000-memory.dmpFilesize
68KB
-
memory/1040-54-0x0000000075E61000-0x0000000075E63000-memory.dmpFilesize
8KB
-
memory/1040-68-0x0000000074090000-0x000000007463B000-memory.dmpFilesize
5.7MB
-
memory/1876-59-0x0000000000000000-mapping.dmp
-
memory/1952-55-0x0000000000000000-mapping.dmp