Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 12:15
Static task
static1
Behavioral task
behavioral1
Sample
7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe
Resource
win10v2004-20230220-en
General
-
Target
7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe
-
Size
206KB
-
MD5
ebff7ad7e3ff8f4da20804cf20f3830b
-
SHA1
eda315c262c7f28f4bd3433bd7e40a3d7b47eacf
-
SHA256
7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0
-
SHA512
ba133d88d3b9ef84ca7690a73dadb515367236473ef78312187a16823a7cfaf1d74bf9da493b1e9b7c0a54c6e2a9b40056d26908cf459bd401b5bfa8b2ca26f5
-
SSDEEP
3072:meTRJ0kHbnpN23kQKp5XzutZXKGrpeN84LuZAIybiy3xEfbi:FTR2AnpN2wDurXBeBuZAIMEj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation metado.exe -
Executes dropped EXE 4 IoCs
pid Process 2220 metado.exe 1708 metado.exe 3732 metado.exe 3420 metado.exe -
Loads dropped DLL 1 IoCs
pid Process 3856 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4244 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1380 7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2220 1380 7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe 83 PID 1380 wrote to memory of 2220 1380 7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe 83 PID 1380 wrote to memory of 2220 1380 7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe 83 PID 2220 wrote to memory of 4244 2220 metado.exe 84 PID 2220 wrote to memory of 4244 2220 metado.exe 84 PID 2220 wrote to memory of 4244 2220 metado.exe 84 PID 2220 wrote to memory of 3964 2220 metado.exe 86 PID 2220 wrote to memory of 3964 2220 metado.exe 86 PID 2220 wrote to memory of 3964 2220 metado.exe 86 PID 3964 wrote to memory of 3904 3964 cmd.exe 88 PID 3964 wrote to memory of 3904 3964 cmd.exe 88 PID 3964 wrote to memory of 3904 3964 cmd.exe 88 PID 3964 wrote to memory of 1572 3964 cmd.exe 89 PID 3964 wrote to memory of 1572 3964 cmd.exe 89 PID 3964 wrote to memory of 1572 3964 cmd.exe 89 PID 3964 wrote to memory of 1304 3964 cmd.exe 90 PID 3964 wrote to memory of 1304 3964 cmd.exe 90 PID 3964 wrote to memory of 1304 3964 cmd.exe 90 PID 3964 wrote to memory of 3580 3964 cmd.exe 91 PID 3964 wrote to memory of 3580 3964 cmd.exe 91 PID 3964 wrote to memory of 3580 3964 cmd.exe 91 PID 3964 wrote to memory of 1492 3964 cmd.exe 92 PID 3964 wrote to memory of 1492 3964 cmd.exe 92 PID 3964 wrote to memory of 1492 3964 cmd.exe 92 PID 3964 wrote to memory of 2592 3964 cmd.exe 93 PID 3964 wrote to memory of 2592 3964 cmd.exe 93 PID 3964 wrote to memory of 2592 3964 cmd.exe 93 PID 2220 wrote to memory of 3856 2220 metado.exe 102 PID 2220 wrote to memory of 3856 2220 metado.exe 102 PID 2220 wrote to memory of 3856 2220 metado.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe"C:\Users\Admin\AppData\Local\Temp\7117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F3⤵
- Creates scheduled task(s)
PID:4244
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:N"4⤵PID:1572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:R" /E4⤵PID:1304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3580
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:N"4⤵PID:1492
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:R" /E4⤵PID:2592
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:1708
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:3732
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:3420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ebff7ad7e3ff8f4da20804cf20f3830b
SHA1eda315c262c7f28f4bd3433bd7e40a3d7b47eacf
SHA2567117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0
SHA512ba133d88d3b9ef84ca7690a73dadb515367236473ef78312187a16823a7cfaf1d74bf9da493b1e9b7c0a54c6e2a9b40056d26908cf459bd401b5bfa8b2ca26f5
-
Filesize
206KB
MD5ebff7ad7e3ff8f4da20804cf20f3830b
SHA1eda315c262c7f28f4bd3433bd7e40a3d7b47eacf
SHA2567117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0
SHA512ba133d88d3b9ef84ca7690a73dadb515367236473ef78312187a16823a7cfaf1d74bf9da493b1e9b7c0a54c6e2a9b40056d26908cf459bd401b5bfa8b2ca26f5
-
Filesize
206KB
MD5ebff7ad7e3ff8f4da20804cf20f3830b
SHA1eda315c262c7f28f4bd3433bd7e40a3d7b47eacf
SHA2567117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0
SHA512ba133d88d3b9ef84ca7690a73dadb515367236473ef78312187a16823a7cfaf1d74bf9da493b1e9b7c0a54c6e2a9b40056d26908cf459bd401b5bfa8b2ca26f5
-
Filesize
206KB
MD5ebff7ad7e3ff8f4da20804cf20f3830b
SHA1eda315c262c7f28f4bd3433bd7e40a3d7b47eacf
SHA2567117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0
SHA512ba133d88d3b9ef84ca7690a73dadb515367236473ef78312187a16823a7cfaf1d74bf9da493b1e9b7c0a54c6e2a9b40056d26908cf459bd401b5bfa8b2ca26f5
-
Filesize
206KB
MD5ebff7ad7e3ff8f4da20804cf20f3830b
SHA1eda315c262c7f28f4bd3433bd7e40a3d7b47eacf
SHA2567117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0
SHA512ba133d88d3b9ef84ca7690a73dadb515367236473ef78312187a16823a7cfaf1d74bf9da493b1e9b7c0a54c6e2a9b40056d26908cf459bd401b5bfa8b2ca26f5
-
Filesize
206KB
MD5ebff7ad7e3ff8f4da20804cf20f3830b
SHA1eda315c262c7f28f4bd3433bd7e40a3d7b47eacf
SHA2567117bb927bf0b9ea104907e1078dcf6d2af39e4fe25f97e61ea7ae6625ed5be0
SHA512ba133d88d3b9ef84ca7690a73dadb515367236473ef78312187a16823a7cfaf1d74bf9da493b1e9b7c0a54c6e2a9b40056d26908cf459bd401b5bfa8b2ca26f5
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5