Analysis
-
max time kernel
153s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 23:02
Static task
static1
Behavioral task
behavioral1
Sample
2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe
Resource
win10v2004-20220414-en
General
-
Target
2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe
-
Size
78KB
-
MD5
02f5b7afb2fcd2301daa10fcb64e7998
-
SHA1
a1641dcd6cd0d2b7f9c2a8b52917deb3b340a61e
-
SHA256
2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc
-
SHA512
7c7d05b7380829caf16a95174f1d0e4433e23ac24c4b822e02349c3a8f53e7e91981e7186bbe8e72173b4cf3cdcfdf8e22dc899c59f632c78ec04b6c038bcea7
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Executes dropped EXE 1 IoCs
Processes:
tmp9F4C.tmp.exepid process 1368 tmp9F4C.tmp.exe -
Deletes itself 1 IoCs
Processes:
tmp9F4C.tmp.exepid process 1368 tmp9F4C.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exepid process 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp9F4C.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp9F4C.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exetmp9F4C.tmp.exedescription pid process Token: SeDebugPrivilege 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe Token: SeDebugPrivilege 1368 tmp9F4C.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exevbc.exedescription pid process target process PID 1636 wrote to memory of 1508 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe vbc.exe PID 1636 wrote to memory of 1508 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe vbc.exe PID 1636 wrote to memory of 1508 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe vbc.exe PID 1636 wrote to memory of 1508 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe vbc.exe PID 1508 wrote to memory of 316 1508 vbc.exe cvtres.exe PID 1508 wrote to memory of 316 1508 vbc.exe cvtres.exe PID 1508 wrote to memory of 316 1508 vbc.exe cvtres.exe PID 1508 wrote to memory of 316 1508 vbc.exe cvtres.exe PID 1636 wrote to memory of 1368 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe tmp9F4C.tmp.exe PID 1636 wrote to memory of 1368 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe tmp9F4C.tmp.exe PID 1636 wrote to memory of 1368 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe tmp9F4C.tmp.exe PID 1636 wrote to memory of 1368 1636 2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe tmp9F4C.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe"C:\Users\Admin\AppData\Local\Temp\2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0uanbfvm.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA594.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA574.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp9F4C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9F4C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\2809a452352da889eeed994581bfebd27e17189f363349a968437be67340dfbc.exe2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0uanbfvm.0.vbFilesize
15KB
MD5f3257055a2e0c13873979000721e88a2
SHA19af9db537a76ed118f41bb31961516c40343dccf
SHA256ef2471d545949b0da478fab7417328a2ca8192b0bb4921797fa35fa6b3bf248c
SHA5124b00d2e559d3b8b0645746bb9a97941ce6213e1c4eb5335c632c294bfb684c6cd6caedbd67dd8377e38fda09e4e0241167350da83f15794e5fdd3db88d272c48
-
C:\Users\Admin\AppData\Local\Temp\0uanbfvm.cmdlineFilesize
266B
MD54da32afd2f4610dda46e9651e0408a9c
SHA1e20e3a9e40ed6631532ace529961e854a97c032d
SHA256eb872894f9a167791e62c7dee2ad3917db30184b1e67cc58d52b32ef1a7d87b7
SHA512013ab47d44295f35b49ec70a498a1f0376131b6e20130064d28ff879e291e6f2e86e4d55f1ebf28217b3d91aebd4c5dea9c7d4fe975087f95f65a27fe0672ed0
-
C:\Users\Admin\AppData\Local\Temp\RESA594.tmpFilesize
1KB
MD57f94a50f449f4fbc12b3767d774a45fe
SHA1f25e3488d2df6ca8250fc141243911ddda2ecf52
SHA2565376c66db7b728b800b873aa126d93bb868329a2c6ea25e9f78a50eadc4d9bd1
SHA51200c9d1ef6ced6d8264f4b96838381b8a24a2c4a7b8dd7b64802605777bf91bd6583bb32ce46423a49fcb088cc65dc1ea7eaaea80086f8d096c75edf982b7b574
-
C:\Users\Admin\AppData\Local\Temp\tmp9F4C.tmp.exeFilesize
78KB
MD5e1bb9a5cd2f9ff77e91c0b622b9f98be
SHA169989c8e05002b61a632bfdfde7a6d83b94a6a0e
SHA2561b058c8fc24192d7ac982d3c2e793c141a6db46c648a4df50b4465bc54afa192
SHA51293e7d74dbcbeeab281f084be2b62009c0f9767ed5120499005380952dc9b9f4099c40e040d1920217e35bda173f2562a55c25b4b30e97cf75636d58ff73830f2
-
C:\Users\Admin\AppData\Local\Temp\tmp9F4C.tmp.exeFilesize
78KB
MD5e1bb9a5cd2f9ff77e91c0b622b9f98be
SHA169989c8e05002b61a632bfdfde7a6d83b94a6a0e
SHA2561b058c8fc24192d7ac982d3c2e793c141a6db46c648a4df50b4465bc54afa192
SHA51293e7d74dbcbeeab281f084be2b62009c0f9767ed5120499005380952dc9b9f4099c40e040d1920217e35bda173f2562a55c25b4b30e97cf75636d58ff73830f2
-
C:\Users\Admin\AppData\Local\Temp\vbcA574.tmpFilesize
660B
MD501592a8a0f78a804b7ad4af6a1f54057
SHA1a2bfb4a071895f3074446c7ad12015f06cd0494e
SHA2562417a668c949c85e0fc1881f906d7298f38445ec4a6e275f8934b2eae59cc1bb
SHA5122c1a64a5a0b9b493667fcbb759bc92d4967cc48ed80ecdcfb5a9cab3b82de540141a9ab47c10e92e3bbf0e1fcd3f824e08cfe4382d0ecea973eb6a4bbe895dcd
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107
-
\Users\Admin\AppData\Local\Temp\tmp9F4C.tmp.exeFilesize
78KB
MD5e1bb9a5cd2f9ff77e91c0b622b9f98be
SHA169989c8e05002b61a632bfdfde7a6d83b94a6a0e
SHA2561b058c8fc24192d7ac982d3c2e793c141a6db46c648a4df50b4465bc54afa192
SHA51293e7d74dbcbeeab281f084be2b62009c0f9767ed5120499005380952dc9b9f4099c40e040d1920217e35bda173f2562a55c25b4b30e97cf75636d58ff73830f2
-
\Users\Admin\AppData\Local\Temp\tmp9F4C.tmp.exeFilesize
78KB
MD5e1bb9a5cd2f9ff77e91c0b622b9f98be
SHA169989c8e05002b61a632bfdfde7a6d83b94a6a0e
SHA2561b058c8fc24192d7ac982d3c2e793c141a6db46c648a4df50b4465bc54afa192
SHA51293e7d74dbcbeeab281f084be2b62009c0f9767ed5120499005380952dc9b9f4099c40e040d1920217e35bda173f2562a55c25b4b30e97cf75636d58ff73830f2
-
memory/316-60-0x0000000000000000-mapping.dmp
-
memory/1368-66-0x0000000000000000-mapping.dmp
-
memory/1368-69-0x0000000074490000-0x0000000074A3B000-memory.dmpFilesize
5.7MB
-
memory/1368-70-0x0000000000D85000-0x0000000000D96000-memory.dmpFilesize
68KB
-
memory/1508-55-0x0000000000000000-mapping.dmp
-
memory/1636-54-0x0000000075721000-0x0000000075723000-memory.dmpFilesize
8KB
-
memory/1636-57-0x00000000744D0000-0x0000000074A7B000-memory.dmpFilesize
5.7MB