Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe
Resource
win10v2004-20230220-en
General
-
Target
c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe
-
Size
206KB
-
MD5
b59e30364a773b8e87056ddeb28e457c
-
SHA1
95992adbfb48e6386e312b0df0c68d2cd1f09f21
-
SHA256
c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037
-
SHA512
4c0e1fbc38f577cfef21f7e90c0fc73e93e8e0cdde587e925df0d6735688c614d5ad8dd2bacbeabfb6fea8caaef6d502a04158afe952d826cebb15a0aebf0d4d
-
SSDEEP
3072:meTRJ0kHbnpN23kQKp5XzutZXKGrpeN84LuZAIybiy3xEfbi:FTR2AnpN2wDurXBeBuZAIMEj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation metado.exe -
Executes dropped EXE 4 IoCs
pid Process 1168 metado.exe 1952 metado.exe 2472 metado.exe 1312 metado.exe -
Loads dropped DLL 1 IoCs
pid Process 4464 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1552 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3580 c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1168 3580 c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe 83 PID 3580 wrote to memory of 1168 3580 c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe 83 PID 3580 wrote to memory of 1168 3580 c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe 83 PID 1168 wrote to memory of 1552 1168 metado.exe 84 PID 1168 wrote to memory of 1552 1168 metado.exe 84 PID 1168 wrote to memory of 1552 1168 metado.exe 84 PID 1168 wrote to memory of 3772 1168 metado.exe 86 PID 1168 wrote to memory of 3772 1168 metado.exe 86 PID 1168 wrote to memory of 3772 1168 metado.exe 86 PID 3772 wrote to memory of 4452 3772 cmd.exe 88 PID 3772 wrote to memory of 4452 3772 cmd.exe 88 PID 3772 wrote to memory of 4452 3772 cmd.exe 88 PID 3772 wrote to memory of 4444 3772 cmd.exe 89 PID 3772 wrote to memory of 4444 3772 cmd.exe 89 PID 3772 wrote to memory of 4444 3772 cmd.exe 89 PID 3772 wrote to memory of 4912 3772 cmd.exe 90 PID 3772 wrote to memory of 4912 3772 cmd.exe 90 PID 3772 wrote to memory of 4912 3772 cmd.exe 90 PID 3772 wrote to memory of 3252 3772 cmd.exe 91 PID 3772 wrote to memory of 3252 3772 cmd.exe 91 PID 3772 wrote to memory of 3252 3772 cmd.exe 91 PID 3772 wrote to memory of 2972 3772 cmd.exe 92 PID 3772 wrote to memory of 2972 3772 cmd.exe 92 PID 3772 wrote to memory of 2972 3772 cmd.exe 92 PID 3772 wrote to memory of 3596 3772 cmd.exe 93 PID 3772 wrote to memory of 3596 3772 cmd.exe 93 PID 3772 wrote to memory of 3596 3772 cmd.exe 93 PID 1168 wrote to memory of 4464 1168 metado.exe 96 PID 1168 wrote to memory of 4464 1168 metado.exe 96 PID 1168 wrote to memory of 4464 1168 metado.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe"C:\Users\Admin\AppData\Local\Temp\c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F3⤵
- Creates scheduled task(s)
PID:1552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:N"4⤵PID:4444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:R" /E4⤵PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:N"4⤵PID:2972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:R" /E4⤵PID:3596
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:1952
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:2472
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:1312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5b59e30364a773b8e87056ddeb28e457c
SHA195992adbfb48e6386e312b0df0c68d2cd1f09f21
SHA256c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037
SHA5124c0e1fbc38f577cfef21f7e90c0fc73e93e8e0cdde587e925df0d6735688c614d5ad8dd2bacbeabfb6fea8caaef6d502a04158afe952d826cebb15a0aebf0d4d
-
Filesize
206KB
MD5b59e30364a773b8e87056ddeb28e457c
SHA195992adbfb48e6386e312b0df0c68d2cd1f09f21
SHA256c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037
SHA5124c0e1fbc38f577cfef21f7e90c0fc73e93e8e0cdde587e925df0d6735688c614d5ad8dd2bacbeabfb6fea8caaef6d502a04158afe952d826cebb15a0aebf0d4d
-
Filesize
206KB
MD5b59e30364a773b8e87056ddeb28e457c
SHA195992adbfb48e6386e312b0df0c68d2cd1f09f21
SHA256c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037
SHA5124c0e1fbc38f577cfef21f7e90c0fc73e93e8e0cdde587e925df0d6735688c614d5ad8dd2bacbeabfb6fea8caaef6d502a04158afe952d826cebb15a0aebf0d4d
-
Filesize
206KB
MD5b59e30364a773b8e87056ddeb28e457c
SHA195992adbfb48e6386e312b0df0c68d2cd1f09f21
SHA256c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037
SHA5124c0e1fbc38f577cfef21f7e90c0fc73e93e8e0cdde587e925df0d6735688c614d5ad8dd2bacbeabfb6fea8caaef6d502a04158afe952d826cebb15a0aebf0d4d
-
Filesize
206KB
MD5b59e30364a773b8e87056ddeb28e457c
SHA195992adbfb48e6386e312b0df0c68d2cd1f09f21
SHA256c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037
SHA5124c0e1fbc38f577cfef21f7e90c0fc73e93e8e0cdde587e925df0d6735688c614d5ad8dd2bacbeabfb6fea8caaef6d502a04158afe952d826cebb15a0aebf0d4d
-
Filesize
206KB
MD5b59e30364a773b8e87056ddeb28e457c
SHA195992adbfb48e6386e312b0df0c68d2cd1f09f21
SHA256c50f8bf94e8f2cffbd660f3419f14addc30ece7b3c1af6ecd4df2bc2f8679037
SHA5124c0e1fbc38f577cfef21f7e90c0fc73e93e8e0cdde587e925df0d6735688c614d5ad8dd2bacbeabfb6fea8caaef6d502a04158afe952d826cebb15a0aebf0d4d
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5