Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
30-03-2022 04:09
Static task
static1
Behavioral task
behavioral1
Sample
6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe
Resource
win10v2004-20220331-en
General
-
Target
6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe
-
Size
78KB
-
MD5
0a5c54b7f730314ca2a40e5763a2bbda
-
SHA1
bbad076d9732eb7fa8f7f8917ad6afef159a992f
-
SHA256
6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9
-
SHA512
a35859e63013b2557bf7e6da5b2266b41cb88d72916e897dabd5a1b0f9b48db84cbbf4d76400ca449432c10a6c1051a69cc58814c632fd8c37f9fd838fce5087
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Executes dropped EXE 1 IoCs
Processes:
tmpF690.tmp.exepid process 1692 tmpF690.tmp.exe -
Deletes itself 1 IoCs
Processes:
tmpF690.tmp.exepid process 1692 tmpF690.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exepid process 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpF690.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-594401021-1341801952-2355885667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmpF690.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exetmpF690.tmp.exedescription pid process Token: SeDebugPrivilege 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe Token: SeDebugPrivilege 1692 tmpF690.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exevbc.exedescription pid process target process PID 456 wrote to memory of 2040 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe vbc.exe PID 456 wrote to memory of 2040 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe vbc.exe PID 456 wrote to memory of 2040 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe vbc.exe PID 456 wrote to memory of 2040 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe vbc.exe PID 2040 wrote to memory of 864 2040 vbc.exe cvtres.exe PID 2040 wrote to memory of 864 2040 vbc.exe cvtres.exe PID 2040 wrote to memory of 864 2040 vbc.exe cvtres.exe PID 2040 wrote to memory of 864 2040 vbc.exe cvtres.exe PID 456 wrote to memory of 1692 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe tmpF690.tmp.exe PID 456 wrote to memory of 1692 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe tmpF690.tmp.exe PID 456 wrote to memory of 1692 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe tmpF690.tmp.exe PID 456 wrote to memory of 1692 456 6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe tmpF690.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe"C:\Users\Admin\AppData\Local\Temp\6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jmykgl6_.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF807.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF806.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmpF690.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF690.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6fc7902a1237525e8fa7200e38f749e74fb9c410b9ceedb86f7214fe1bc4b4b9.exe2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESF807.tmpFilesize
1KB
MD511906b639257a4849aa340ea081bc3c5
SHA1d403f3555006a78e81b6bd9ac13aa476c8f44f64
SHA256ba521e5fecfc6a2e5b3f81358a7107bfe5c51b034be3d483a7933de371353ff6
SHA512f134e1fe9c5f5d5189c550eaad6262007382379ec9df7c131a064970d2e5b8a01edf90a6817ad33655c38f6f63381768200223c62a67802d622aab83faa95841
-
C:\Users\Admin\AppData\Local\Temp\jmykgl6_.0.vbFilesize
14KB
MD566003cef90385c914cb6ae023e3ed02d
SHA15f6c52a7079e28d9b855ba057756c0681a97030e
SHA256dd1fbcadb99a70d45ec3cf83b826017c0bb3c52ca15f06afcf06bb9a718a43b8
SHA512dc3cd106896c8d65190b9977d4cacbeeb8bfcabd5589224eda8dc3feb1cea00812918cb7c058973c8099a36682aa79dfeb52c3d8661fab018a03165b35fb62d4
-
C:\Users\Admin\AppData\Local\Temp\jmykgl6_.cmdlineFilesize
266B
MD58bd16a36c792f66119ffee09aa29006d
SHA1954ed8a0e2546f7c1d0629eb574c4d89648097d5
SHA256c4a092f0d51be813c513687ee0b84941ab91ec676cd3ff4f3f0c85eb9846a8ee
SHA51287cf8543710def91477d6e43c8d759a6ae2eb2791392ea0d6dacb4bd370a25e4d66088c4afb3d22ed5d8ece71acdbe15eafe15fd356b28dd36897363146f9205
-
C:\Users\Admin\AppData\Local\Temp\tmpF690.tmp.exeFilesize
78KB
MD5d83df7f24f9c6f0e218856168a71b2d0
SHA17f03a23480c08fc40a07404f2d261ca14cb78f73
SHA2567009332ae62074258292217208d05269b9ba840d4af34229496b2157d15ab9ee
SHA5127805014b7bb32ae1f078312069abdf3ce1d0727e8273f4759b8215a6afadd300f269634b8937f164aaf48ade115d01eb6f3600055483222e0a5975f071c4a1ae
-
C:\Users\Admin\AppData\Local\Temp\tmpF690.tmp.exeFilesize
78KB
MD5d83df7f24f9c6f0e218856168a71b2d0
SHA17f03a23480c08fc40a07404f2d261ca14cb78f73
SHA2567009332ae62074258292217208d05269b9ba840d4af34229496b2157d15ab9ee
SHA5127805014b7bb32ae1f078312069abdf3ce1d0727e8273f4759b8215a6afadd300f269634b8937f164aaf48ade115d01eb6f3600055483222e0a5975f071c4a1ae
-
C:\Users\Admin\AppData\Local\Temp\vbcF806.tmpFilesize
660B
MD57b7210adbec153d815343c10bb853806
SHA160bdcc6498f22d3b85723542bc9a4ce2b1a53b1b
SHA256562df6ac18adf166488b6f8aea31e89db44c57fcd58851fd347e864c4c33150e
SHA512b63875076fb72c0a63bfa157e6b6d0a5eb2a3b7ef1811c0036782e846779905515a4f0033b8a843d0194c3eb02ae2e3beb465e97590df43612280a32d7e06be5
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107
-
\Users\Admin\AppData\Local\Temp\tmpF690.tmp.exeFilesize
78KB
MD5d83df7f24f9c6f0e218856168a71b2d0
SHA17f03a23480c08fc40a07404f2d261ca14cb78f73
SHA2567009332ae62074258292217208d05269b9ba840d4af34229496b2157d15ab9ee
SHA5127805014b7bb32ae1f078312069abdf3ce1d0727e8273f4759b8215a6afadd300f269634b8937f164aaf48ade115d01eb6f3600055483222e0a5975f071c4a1ae
-
\Users\Admin\AppData\Local\Temp\tmpF690.tmp.exeFilesize
78KB
MD5d83df7f24f9c6f0e218856168a71b2d0
SHA17f03a23480c08fc40a07404f2d261ca14cb78f73
SHA2567009332ae62074258292217208d05269b9ba840d4af34229496b2157d15ab9ee
SHA5127805014b7bb32ae1f078312069abdf3ce1d0727e8273f4759b8215a6afadd300f269634b8937f164aaf48ade115d01eb6f3600055483222e0a5975f071c4a1ae
-
memory/456-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmpFilesize
8KB
-
memory/456-58-0x0000000074E30000-0x00000000753DB000-memory.dmpFilesize
5.7MB
-
memory/864-60-0x0000000000000000-mapping.dmp
-
memory/1692-66-0x0000000000000000-mapping.dmp
-
memory/1692-69-0x0000000074DC0000-0x000000007536B000-memory.dmpFilesize
5.7MB
-
memory/1692-70-0x00000000020F5000-0x0000000002106000-memory.dmpFilesize
68KB
-
memory/2040-55-0x0000000000000000-mapping.dmp