Analysis

  • max time kernel
    57s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-04-2022 20:03

General

  • Target

    MethamphetamineSolutionsLoader.exe

  • Size

    8.0MB

  • MD5

    760862da38d026ae351dca91202add60

  • SHA1

    ae1def931735a30a44e93a66afa2e72d9d72d8e9

  • SHA256

    1a6fd38ece3d73b6612263fed6de4c553cbb46d6e5637e6cd6214ade39b81782

  • SHA512

    c529abf8099c96b0cfffa023f6d5b6b5dc2c2bcb73e1720042a8a842904cba068d7dcad873019b790fe125670331c791122eb8806fe91711a01987bda2d79bd8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MethamphetamineSolutionsLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\MethamphetamineSolutionsLoader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\monitordhcp\FvrnkODJoiUIyeHAEoTP0Qn5ZC7TdH.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\monitordhcp\z1T7e01kTYgKk52k4EOgwkfTxey3zt.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Users\Admin\AppData\Local\Temp\monitordhcp\RtgNSlMYtFvlTt52WHci.exe
          RtgNSlMYtFvlTt52WHci.exe -p721e19c01b35f90a5d4059aedd8f740b779e743b
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\monitordhcp\4mdxDUI6yqvmVknEtk7bYzbiBR8MHO.vbe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1384
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\monitordhcp\3hvxTv4ZROtMpYMGDajjCJWH8roHGs.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:888
              • C:\Users\Admin\AppData\Local\Temp\monitordhcp\netmonitor.exe
                "C:\Users\Admin\AppData\Local\Temp\monitordhcp\netmonitor.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:520
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\ProgramData\Templates\svchost.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1428
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\csrss.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:872
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "winlogon" /sc ONLOGON /tr "'C:\PerfLogs\Admin\winlogon.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:756
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\ProgramData\Start Menu\services.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:748
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "svchost" /sc ONLOGON /tr "'C:\Recovery\619fcb42-bc70-11ec-bd6f-84e31b84a9f2\svchost.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1936
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\PerfLogs\Admin\csrss.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1012
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\Links for United States\sppsvc.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:856
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla\updates\308046B0AF4A39CB\csrss.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1540
                • C:\Windows\system32\schtasks.exe
                  "schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\PerfLogs\Admin\taskhost.exe'" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:808
                • C:\PerfLogs\Admin\taskhost.exe
                  "C:\PerfLogs\Admin\taskhost.exe"
                  8⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:956
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\monitordhcp\msg.vbs"
            5⤵
              PID:1616

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PerfLogs\Admin\taskhost.exe
      Filesize

      1.6MB

      MD5

      22097aca271c6d085b703bc64422b4b3

      SHA1

      a1e7d6cddc40cdcb675ecd72404d5cec66f7be5b

      SHA256

      4b111342f4fc80eb249bf89f3352b067d0591b9ffb24a74b49a301af5deef133

      SHA512

      9eb7452981524698e4dc0db065614cea5d7f422f386801d57eca6dd93d67a686d573cd241b045f1fe9033c204f33b27861ed5b139004b65b4f07be9426969603

    • C:\PerfLogs\Admin\taskhost.exe
      Filesize

      1.6MB

      MD5

      22097aca271c6d085b703bc64422b4b3

      SHA1

      a1e7d6cddc40cdcb675ecd72404d5cec66f7be5b

      SHA256

      4b111342f4fc80eb249bf89f3352b067d0591b9ffb24a74b49a301af5deef133

      SHA512

      9eb7452981524698e4dc0db065614cea5d7f422f386801d57eca6dd93d67a686d573cd241b045f1fe9033c204f33b27861ed5b139004b65b4f07be9426969603

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\3hvxTv4ZROtMpYMGDajjCJWH8roHGs.bat
      Filesize

      35B

      MD5

      4b64bbf9c835fdb21a4fd461d38a3a65

      SHA1

      5fff8b8e5c48a0e8de844b42c771041ffcdb84af

      SHA256

      ecfc21fd14339226b1c2e0a40be6fe6c590ac05cab44b16e7db397f9471f4ddf

      SHA512

      c11f3ed222b7fdceae583ec0bd9156a0beb030058edfc3c6656d4738e2cdd2b1dccd5b11d13ed53160970258c80cb0baa4ef5592411cb23c077b1e99c7d56892

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\4mdxDUI6yqvmVknEtk7bYzbiBR8MHO.vbe
      Filesize

      227B

      MD5

      abdcd2987b40e0022f1f4f782e5e289b

      SHA1

      fc5606a2292d892a0866858e1f822a0fd18e452b

      SHA256

      6ef2819df6d9e68e766c153dd3ada646d70c0f8cd1326c7dc2eff9b6f4681f5a

      SHA512

      9376bd090379e0fd1bd223e1484974da6630de1de17ef8049c0361dd531e24fb7873cab4d1151c78409a22827e38606fd73fb91d501b782fde40a9a5cd28e4d0

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\FvrnkODJoiUIyeHAEoTP0Qn5ZC7TdH.vbe
      Filesize

      151B

      MD5

      90c3382006ed7324e7abf37fb98894f9

      SHA1

      b54b59c945f8cc5bef2c66361eaac9bfdcab7960

      SHA256

      9505847a0d9c07c385abb1e236c5ef2d3763e69c9eb8d7faba37486d31e0827e

      SHA512

      b0b4ed5929d980abef8027c8861057a7910ab5f5f64d08bb9667d4ddaea906c6330eb28a5bce7fe6daf872bb18eefd3e148a900b66b3079411c0b7d9da6dc9c1

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\MOS
      Filesize

      123B

      MD5

      a96f5f02c199e5179c09381c73f74232

      SHA1

      815ae72244d01d7491e3c9e1764180164ed9f0de

      SHA256

      31f4fd990ffee590b8e3a70c66fdd7d18cb18869dea7d1a73a7e898c6d2e2a74

      SHA512

      8eb5a654adc07373f0557205f674aace467a9cb5be2f6ea9a253e13846a5fc3078b42f836428f040f9c9a23a757a33df05ba61f0c1406f112aaa54cd4b8cccb7

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\RtgNSlMYtFvlTt52WHci.exe
      Filesize

      1.3MB

      MD5

      98b49b687aad9b0dcccebaa71d43747d

      SHA1

      1966ff6f232856e7e25b66f570a02c54960dd1f6

      SHA256

      d4ca9a4ea5d070206824a2b68921c4bdfa7bf038e0f82cfeb0472b17881fbcaf

      SHA512

      02b6a009eca115e09e6228e834ba0654c2804a0b07fda088116412a71f45b59c25f24ab7ceb54a7c1c5d628395e7bc55b94f0240c7438571c4e0c2a9db208ee2

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\RtgNSlMYtFvlTt52WHci.exe
      Filesize

      1.3MB

      MD5

      98b49b687aad9b0dcccebaa71d43747d

      SHA1

      1966ff6f232856e7e25b66f570a02c54960dd1f6

      SHA256

      d4ca9a4ea5d070206824a2b68921c4bdfa7bf038e0f82cfeb0472b17881fbcaf

      SHA512

      02b6a009eca115e09e6228e834ba0654c2804a0b07fda088116412a71f45b59c25f24ab7ceb54a7c1c5d628395e7bc55b94f0240c7438571c4e0c2a9db208ee2

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\msg.vbs
      Filesize

      128B

      MD5

      01c71ea2d98437129936261c48403132

      SHA1

      dc689fb68a3e7e09a334e7a37c0d10d0641af1a6

      SHA256

      0401f2dd76d5ed6f90c82b72e1e7a122ef127bedbaf717532c4bba26d43a0061

      SHA512

      a668d4216a50ccc699221dd902d8b0f864e44368dc7474fa5659a739154d4e769b85d49b60a73affb8fba7628e7210b0f8106d5652006d1bbba67083513e65d9

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\netmonitor.exe
      Filesize

      1.6MB

      MD5

      22097aca271c6d085b703bc64422b4b3

      SHA1

      a1e7d6cddc40cdcb675ecd72404d5cec66f7be5b

      SHA256

      4b111342f4fc80eb249bf89f3352b067d0591b9ffb24a74b49a301af5deef133

      SHA512

      9eb7452981524698e4dc0db065614cea5d7f422f386801d57eca6dd93d67a686d573cd241b045f1fe9033c204f33b27861ed5b139004b65b4f07be9426969603

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\netmonitor.exe
      Filesize

      1.6MB

      MD5

      22097aca271c6d085b703bc64422b4b3

      SHA1

      a1e7d6cddc40cdcb675ecd72404d5cec66f7be5b

      SHA256

      4b111342f4fc80eb249bf89f3352b067d0591b9ffb24a74b49a301af5deef133

      SHA512

      9eb7452981524698e4dc0db065614cea5d7f422f386801d57eca6dd93d67a686d573cd241b045f1fe9033c204f33b27861ed5b139004b65b4f07be9426969603

    • C:\Users\Admin\AppData\Local\Temp\monitordhcp\z1T7e01kTYgKk52k4EOgwkfTxey3zt.bat
      Filesize

      625B

      MD5

      6176c194ea1490ee585985a9374a7f63

      SHA1

      eff00b803ad20094c8a8121d81af3e12aae32a43

      SHA256

      72fc248e868a01f354f6d679389d7b75e6cb53212367221b9599c753a7abe095

      SHA512

      09ebe600cccdbdbe2441b8d147531fe9470a5c7103cf70e71d45d8176d59e3343dbe26e7aab8a1be3356546ee11c7c367857c1452a4a1bc65df21ceb9ae3513d

    • \Users\Admin\AppData\Local\Temp\monitordhcp\RtgNSlMYtFvlTt52WHci.exe
      Filesize

      1.3MB

      MD5

      98b49b687aad9b0dcccebaa71d43747d

      SHA1

      1966ff6f232856e7e25b66f570a02c54960dd1f6

      SHA256

      d4ca9a4ea5d070206824a2b68921c4bdfa7bf038e0f82cfeb0472b17881fbcaf

      SHA512

      02b6a009eca115e09e6228e834ba0654c2804a0b07fda088116412a71f45b59c25f24ab7ceb54a7c1c5d628395e7bc55b94f0240c7438571c4e0c2a9db208ee2

    • \Users\Admin\AppData\Local\Temp\monitordhcp\netmonitor.exe
      Filesize

      1.6MB

      MD5

      22097aca271c6d085b703bc64422b4b3

      SHA1

      a1e7d6cddc40cdcb675ecd72404d5cec66f7be5b

      SHA256

      4b111342f4fc80eb249bf89f3352b067d0591b9ffb24a74b49a301af5deef133

      SHA512

      9eb7452981524698e4dc0db065614cea5d7f422f386801d57eca6dd93d67a686d573cd241b045f1fe9033c204f33b27861ed5b139004b65b4f07be9426969603

    • memory/520-78-0x0000000000EA0000-0x0000000001048000-memory.dmp
      Filesize

      1.7MB

    • memory/520-75-0x0000000000000000-mapping.dmp
    • memory/520-79-0x0000000000280000-0x000000000029A000-memory.dmp
      Filesize

      104KB

    • memory/748-83-0x0000000000000000-mapping.dmp
    • memory/756-82-0x0000000000000000-mapping.dmp
    • memory/808-88-0x0000000000000000-mapping.dmp
    • memory/856-86-0x0000000000000000-mapping.dmp
    • memory/872-81-0x0000000000000000-mapping.dmp
    • memory/888-73-0x0000000000000000-mapping.dmp
    • memory/956-93-0x0000000000290000-0x00000000002AA000-memory.dmp
      Filesize

      104KB

    • memory/956-89-0x0000000000000000-mapping.dmp
    • memory/956-92-0x0000000000EB0000-0x0000000001058000-memory.dmp
      Filesize

      1.7MB

    • memory/1012-85-0x0000000000000000-mapping.dmp
    • memory/1384-65-0x0000000000000000-mapping.dmp
    • memory/1428-80-0x0000000000000000-mapping.dmp
    • memory/1492-62-0x0000000000000000-mapping.dmp
    • memory/1540-87-0x0000000000000000-mapping.dmp
    • memory/1616-66-0x0000000000000000-mapping.dmp
    • memory/1656-59-0x0000000000000000-mapping.dmp
    • memory/1696-55-0x0000000000000000-mapping.dmp
    • memory/1936-84-0x0000000000000000-mapping.dmp
    • memory/2024-54-0x0000000075381000-0x0000000075383000-memory.dmp
      Filesize

      8KB