Analysis
-
max time kernel
194s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 16:46
Static task
static1
Behavioral task
behavioral1
Sample
5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe
Resource
win10v2004-20220414-en
General
-
Target
5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe
-
Size
78KB
-
MD5
03e7554116590a34c071d2c7954df17d
-
SHA1
d4b801e0f7427bf55e2440b59139cb4365a54e62
-
SHA256
5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3
-
SHA512
148aa862f433bfc3f006e596a7d273546d389a9740a738a0abf11d152b0437fb1ed474854ac1904e740c7441670f170235b8f00eabd7ee57bf688c47fb963c40
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Executes dropped EXE 1 IoCs
Processes:
tmp7714.tmp.exepid process 1988 tmp7714.tmp.exe -
Deletes itself 1 IoCs
Processes:
tmp7714.tmp.exepid process 1988 tmp7714.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exepid process 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp7714.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp7714.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exetmp7714.tmp.exedescription pid process Token: SeDebugPrivilege 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe Token: SeDebugPrivilege 1988 tmp7714.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exevbc.exedescription pid process target process PID 1072 wrote to memory of 1656 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe vbc.exe PID 1072 wrote to memory of 1656 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe vbc.exe PID 1072 wrote to memory of 1656 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe vbc.exe PID 1072 wrote to memory of 1656 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe vbc.exe PID 1656 wrote to memory of 856 1656 vbc.exe cvtres.exe PID 1656 wrote to memory of 856 1656 vbc.exe cvtres.exe PID 1656 wrote to memory of 856 1656 vbc.exe cvtres.exe PID 1656 wrote to memory of 856 1656 vbc.exe cvtres.exe PID 1072 wrote to memory of 1988 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe tmp7714.tmp.exe PID 1072 wrote to memory of 1988 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe tmp7714.tmp.exe PID 1072 wrote to memory of 1988 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe tmp7714.tmp.exe PID 1072 wrote to memory of 1988 1072 5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe tmp7714.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe"C:\Users\Admin\AppData\Local\Temp\5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pravmhac.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES788C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc788B.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp7714.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7714.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5731b6f1e4ff3229cfb784ce7c75054f7d312e0e5c2d0c14d2f11a78b8146ab3.exe2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES788C.tmpFilesize
1KB
MD5321f38d0e0a8e1100cbf0eeae50ebec5
SHA1d9d9a8af122e254b9eaddfc672edc154fb0b9fb5
SHA256c9e7dd733ccec60fa39682b17b24724d91751abeec0f49f0f5c5b662051946f9
SHA51208f7b800f1d6219c96702748bbf8ef5a1fbda5550c8c786c329df40e25802c9a90aaf56efa574e6c725ef2e55260c348d3450caede216a401203ae98c923be21
-
C:\Users\Admin\AppData\Local\Temp\pravmhac.0.vbFilesize
14KB
MD5404ebbaf2f8af8ab8d838629a84f6016
SHA1dc5c3061692f7c17d8c27e3337c1b07d2114d70e
SHA2563053b8301d487822724ce7649123b78626ffdff3bb5652df274d0c9f3a9d79dc
SHA512b384ca4e8ccd3200433ff669873542ecfa672879d1c3343320415a55514e7ad0b6b5c936b81dd15ccf58bfdb5b9482d8c60f8dc42dea6b7c64323127ed1e9d57
-
C:\Users\Admin\AppData\Local\Temp\pravmhac.cmdlineFilesize
266B
MD529714a8799d1dc11316b0ae89026bd4a
SHA17553809a71be44d8724915505f7269abfb60c267
SHA256bb422451792e3deb6cc687e7e3a5180fdc8b42b546103eca1fcbf96bc4df770b
SHA512a9fa27d45fa255b7a7ef87af306645503c0014d591925dcdb987681a644723e7eca949e9d3f65ed423654626b3ecd236279db167b72c8a28fd23a13a564f57e4
-
C:\Users\Admin\AppData\Local\Temp\tmp7714.tmp.exeFilesize
78KB
MD53fb673395027f7ce7f3096ff644b203a
SHA12d303c3b8b547b58b0b4fcb9e3399baaf3c3497f
SHA256b7a9050f3760494acb67a4e19f277c7acb2d1c4f08b8875e7a86fa97f1d98361
SHA512db4e39ac918e768b6ab0bb9689cb98a3a4f0c5d258991bac45d3874901ddbc8f5a04d7986719e388d9d265516b074d1547a9c69be7f28b464d153142ede248b6
-
C:\Users\Admin\AppData\Local\Temp\tmp7714.tmp.exeFilesize
78KB
MD53fb673395027f7ce7f3096ff644b203a
SHA12d303c3b8b547b58b0b4fcb9e3399baaf3c3497f
SHA256b7a9050f3760494acb67a4e19f277c7acb2d1c4f08b8875e7a86fa97f1d98361
SHA512db4e39ac918e768b6ab0bb9689cb98a3a4f0c5d258991bac45d3874901ddbc8f5a04d7986719e388d9d265516b074d1547a9c69be7f28b464d153142ede248b6
-
C:\Users\Admin\AppData\Local\Temp\vbc788B.tmpFilesize
660B
MD593a32f1948c1ef4c281382bb94bfafdd
SHA1b70f13fd999b97ae5d8359a0d32ecb223bce6dbe
SHA256fc254b028a1e416a5f546ddf5e69770ade99ba7522e213f2702a929fbc2ab97b
SHA5124c8d15025fb2742c233e0f11daf279681f273e2fab5560d6db7f7b1f7cba10e0f647aef99dfe85b95590107153fb039732dbb5658397f87d7b32ebf77d50ca6b
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
\Users\Admin\AppData\Local\Temp\tmp7714.tmp.exeFilesize
78KB
MD53fb673395027f7ce7f3096ff644b203a
SHA12d303c3b8b547b58b0b4fcb9e3399baaf3c3497f
SHA256b7a9050f3760494acb67a4e19f277c7acb2d1c4f08b8875e7a86fa97f1d98361
SHA512db4e39ac918e768b6ab0bb9689cb98a3a4f0c5d258991bac45d3874901ddbc8f5a04d7986719e388d9d265516b074d1547a9c69be7f28b464d153142ede248b6
-
\Users\Admin\AppData\Local\Temp\tmp7714.tmp.exeFilesize
78KB
MD53fb673395027f7ce7f3096ff644b203a
SHA12d303c3b8b547b58b0b4fcb9e3399baaf3c3497f
SHA256b7a9050f3760494acb67a4e19f277c7acb2d1c4f08b8875e7a86fa97f1d98361
SHA512db4e39ac918e768b6ab0bb9689cb98a3a4f0c5d258991bac45d3874901ddbc8f5a04d7986719e388d9d265516b074d1547a9c69be7f28b464d153142ede248b6
-
memory/856-60-0x0000000000000000-mapping.dmp
-
memory/1072-55-0x0000000074720000-0x0000000074CCB000-memory.dmpFilesize
5.7MB
-
memory/1072-54-0x0000000075841000-0x0000000075843000-memory.dmpFilesize
8KB
-
memory/1656-56-0x0000000000000000-mapping.dmp
-
memory/1988-66-0x0000000000000000-mapping.dmp
-
memory/1988-69-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB
-
memory/1988-70-0x0000000000220000-0x0000000000260000-memory.dmpFilesize
256KB