Analysis
-
max time kernel
152s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe
Resource
win10v2004-20220414-en
General
-
Target
ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe
-
Size
78KB
-
MD5
06af9b765f0971d34da6cee01bb0dfd3
-
SHA1
d418e6d883263be3253b8e7884b3481ee9e362ba
-
SHA256
ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48
-
SHA512
3d20ef5897663c30fc0669fc0f1498d9b7f9fee5a1ab002022a03140e9075797eb8c4108777f22888d44004dc914601a71066592ae9b1a3c52b03bab0959f285
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Executes dropped EXE 1 IoCs
Processes:
tmpA851.tmp.exepid process 1272 tmpA851.tmp.exe -
Deletes itself 1 IoCs
Processes:
tmpA851.tmp.exepid process 1272 tmpA851.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exepid process 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpA851.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpA851.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exetmpA851.tmp.exedescription pid process Token: SeDebugPrivilege 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe Token: SeDebugPrivilege 1272 tmpA851.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exevbc.exedescription pid process target process PID 916 wrote to memory of 1516 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe vbc.exe PID 916 wrote to memory of 1516 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe vbc.exe PID 916 wrote to memory of 1516 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe vbc.exe PID 916 wrote to memory of 1516 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe vbc.exe PID 1516 wrote to memory of 1400 1516 vbc.exe cvtres.exe PID 1516 wrote to memory of 1400 1516 vbc.exe cvtres.exe PID 1516 wrote to memory of 1400 1516 vbc.exe cvtres.exe PID 1516 wrote to memory of 1400 1516 vbc.exe cvtres.exe PID 916 wrote to memory of 1272 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe tmpA851.tmp.exe PID 916 wrote to memory of 1272 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe tmpA851.tmp.exe PID 916 wrote to memory of 1272 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe tmpA851.tmp.exe PID 916 wrote to memory of 1272 916 ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe tmpA851.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe"C:\Users\Admin\AppData\Local\Temp\ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\9oaop9ia.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAB7D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAB5D.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmpA851.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA851.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ba0d2916dfa7f5be3b4698d5d1688d8e05e50b0ffe102a41a21d104ac1ba5f48.exe2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9oaop9ia.0.vbFilesize
14KB
MD513c3e2324c17610326311fcd48fc3feb
SHA127c6fdc93c56a8fee9cf6236441228fc6d87af71
SHA25609a09e387033433116c4aa32608a6be104e9e631eb85b737ca18ee26844812de
SHA512bdb13e3778f914bc157180524fddfbc984fe2290fc8160e5ba8ad2a285e0846b71aa0c273eb1bb1167e219d7acc528253808c43031e59b4a9bd3ead22080bde2
-
C:\Users\Admin\AppData\Local\Temp\9oaop9ia.cmdlineFilesize
266B
MD572dd27c4c50111a1f9ddd1669a5c0167
SHA1191e7d5d59ffe0a46c856b712f6f51b9b3465f17
SHA256e1d1618a12d36b7245b753045b9cfd39d5d34e8f99e358a11a3cbebbf2fed0eb
SHA512561e8c21edf0c1baa3e56f9dbddafb11ddc44bed9c5381f2b83321cd63dba69c5efc2f9558d56d5c9f9b305e36071a8f226c3b270e2ee0cd7f4b83914bf11340
-
C:\Users\Admin\AppData\Local\Temp\RESAB7D.tmpFilesize
1KB
MD58e7790bd9d78370d91261550a7b90023
SHA14e0d2bd63abb65ba3587174d7143ac7887983054
SHA256c2245222e53146751776c84f363d10debe3f83a459b9c0fc95a8b904390f2066
SHA5125150ef85446c45a8925325e0157e75871da40c849d2f72e3c935e50f0203a9e061c2e8d44d2705392c9b362b4efb77ebc454f8491e24a66defc730c7fc628a87
-
C:\Users\Admin\AppData\Local\Temp\tmpA851.tmp.exeFilesize
78KB
MD5c8a1b0ee30154d010c8810a6f5f85241
SHA186ef3626c9f609331836335b160ce190a0f52927
SHA25613f295b2c77190a5cd42aeafd3c8e00c96c9bcb1a027ba519ee3ff9174c52563
SHA512ae7d62f50f40b16ddd8807124bae6e14913b725199e68786937ff919ef6f84ed7031af6e2d68aecb9fa51ed28529358312f265215b6fca24120786d068094a6c
-
C:\Users\Admin\AppData\Local\Temp\tmpA851.tmp.exeFilesize
78KB
MD5c8a1b0ee30154d010c8810a6f5f85241
SHA186ef3626c9f609331836335b160ce190a0f52927
SHA25613f295b2c77190a5cd42aeafd3c8e00c96c9bcb1a027ba519ee3ff9174c52563
SHA512ae7d62f50f40b16ddd8807124bae6e14913b725199e68786937ff919ef6f84ed7031af6e2d68aecb9fa51ed28529358312f265215b6fca24120786d068094a6c
-
C:\Users\Admin\AppData\Local\Temp\vbcAB5D.tmpFilesize
660B
MD50d610b12884e9502d7258fe70098b910
SHA1254c956d9ee616e58974260f1ea395a41e8a43af
SHA2569d520930df125c0b1914e53d1815a97cca8c7401523b2c25bc7faaab0ddfee55
SHA512896e6ee813990111c618de8071e8c918bc438e3ca36e21626b43ad5eef7204596aefc5ab4af010187b7aec0496b42a3b76919e3be1a7038ba885d5b755b00261
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
\Users\Admin\AppData\Local\Temp\tmpA851.tmp.exeFilesize
78KB
MD5c8a1b0ee30154d010c8810a6f5f85241
SHA186ef3626c9f609331836335b160ce190a0f52927
SHA25613f295b2c77190a5cd42aeafd3c8e00c96c9bcb1a027ba519ee3ff9174c52563
SHA512ae7d62f50f40b16ddd8807124bae6e14913b725199e68786937ff919ef6f84ed7031af6e2d68aecb9fa51ed28529358312f265215b6fca24120786d068094a6c
-
\Users\Admin\AppData\Local\Temp\tmpA851.tmp.exeFilesize
78KB
MD5c8a1b0ee30154d010c8810a6f5f85241
SHA186ef3626c9f609331836335b160ce190a0f52927
SHA25613f295b2c77190a5cd42aeafd3c8e00c96c9bcb1a027ba519ee3ff9174c52563
SHA512ae7d62f50f40b16ddd8807124bae6e14913b725199e68786937ff919ef6f84ed7031af6e2d68aecb9fa51ed28529358312f265215b6fca24120786d068094a6c
-
memory/916-54-0x0000000075711000-0x0000000075713000-memory.dmpFilesize
8KB
-
memory/916-55-0x0000000073FD0000-0x000000007457B000-memory.dmpFilesize
5.7MB
-
memory/1272-66-0x0000000000000000-mapping.dmp
-
memory/1272-69-0x0000000073A20000-0x0000000073FCB000-memory.dmpFilesize
5.7MB
-
memory/1272-70-0x0000000000C85000-0x0000000000C96000-memory.dmpFilesize
68KB
-
memory/1400-60-0x0000000000000000-mapping.dmp
-
memory/1516-56-0x0000000000000000-mapping.dmp