Analysis
-
max time kernel
104s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07/06/2023, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe
Resource
win10-20230220-en
General
-
Target
0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe
-
Size
207KB
-
MD5
8b7097a908f41c9bf66bd56d9679d7c1
-
SHA1
9ea9f0d698bdc67422f91d3ed6cca8eafc1cfe98
-
SHA256
0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e
-
SHA512
73154416e893b19aff79afff5e5e307c0d0a6041f35835d36e14ec255cae5fac2e6370b95a485c61ca35d5a7222d63bba6ee38bfc1107545a1e542286e0cff4d
-
SSDEEP
3072:meTRJ0kHbnpN23kQKp5XzutZXKGrpeN84LuZAIybiy3xEfbi:FTR2AnpN2wDurXBeBuZAIMEj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4900 metado.exe 4388 metado.exe 4436 metado.exe -
Loads dropped DLL 1 IoCs
pid Process 4780 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2080 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4076 0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4900 4076 0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe 66 PID 4076 wrote to memory of 4900 4076 0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe 66 PID 4076 wrote to memory of 4900 4076 0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe 66 PID 4900 wrote to memory of 2080 4900 metado.exe 67 PID 4900 wrote to memory of 2080 4900 metado.exe 67 PID 4900 wrote to memory of 2080 4900 metado.exe 67 PID 4900 wrote to memory of 1660 4900 metado.exe 69 PID 4900 wrote to memory of 1660 4900 metado.exe 69 PID 4900 wrote to memory of 1660 4900 metado.exe 69 PID 1660 wrote to memory of 4084 1660 cmd.exe 71 PID 1660 wrote to memory of 4084 1660 cmd.exe 71 PID 1660 wrote to memory of 4084 1660 cmd.exe 71 PID 1660 wrote to memory of 4488 1660 cmd.exe 72 PID 1660 wrote to memory of 4488 1660 cmd.exe 72 PID 1660 wrote to memory of 4488 1660 cmd.exe 72 PID 1660 wrote to memory of 4640 1660 cmd.exe 73 PID 1660 wrote to memory of 4640 1660 cmd.exe 73 PID 1660 wrote to memory of 4640 1660 cmd.exe 73 PID 1660 wrote to memory of 4704 1660 cmd.exe 74 PID 1660 wrote to memory of 4704 1660 cmd.exe 74 PID 1660 wrote to memory of 4704 1660 cmd.exe 74 PID 1660 wrote to memory of 4756 1660 cmd.exe 75 PID 1660 wrote to memory of 4756 1660 cmd.exe 75 PID 1660 wrote to memory of 4756 1660 cmd.exe 75 PID 1660 wrote to memory of 4812 1660 cmd.exe 76 PID 1660 wrote to memory of 4812 1660 cmd.exe 76 PID 1660 wrote to memory of 4812 1660 cmd.exe 76 PID 4900 wrote to memory of 4780 4900 metado.exe 78 PID 4900 wrote to memory of 4780 4900 metado.exe 78 PID 4900 wrote to memory of 4780 4900 metado.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe"C:\Users\Admin\AppData\Local\Temp\0d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F3⤵
- Creates scheduled task(s)
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:N"4⤵PID:4488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:R" /E4⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:N"4⤵PID:4756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:R" /E4⤵PID:4812
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:4388
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:4436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD58b7097a908f41c9bf66bd56d9679d7c1
SHA19ea9f0d698bdc67422f91d3ed6cca8eafc1cfe98
SHA2560d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e
SHA51273154416e893b19aff79afff5e5e307c0d0a6041f35835d36e14ec255cae5fac2e6370b95a485c61ca35d5a7222d63bba6ee38bfc1107545a1e542286e0cff4d
-
Filesize
207KB
MD58b7097a908f41c9bf66bd56d9679d7c1
SHA19ea9f0d698bdc67422f91d3ed6cca8eafc1cfe98
SHA2560d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e
SHA51273154416e893b19aff79afff5e5e307c0d0a6041f35835d36e14ec255cae5fac2e6370b95a485c61ca35d5a7222d63bba6ee38bfc1107545a1e542286e0cff4d
-
Filesize
207KB
MD58b7097a908f41c9bf66bd56d9679d7c1
SHA19ea9f0d698bdc67422f91d3ed6cca8eafc1cfe98
SHA2560d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e
SHA51273154416e893b19aff79afff5e5e307c0d0a6041f35835d36e14ec255cae5fac2e6370b95a485c61ca35d5a7222d63bba6ee38bfc1107545a1e542286e0cff4d
-
Filesize
207KB
MD58b7097a908f41c9bf66bd56d9679d7c1
SHA19ea9f0d698bdc67422f91d3ed6cca8eafc1cfe98
SHA2560d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e
SHA51273154416e893b19aff79afff5e5e307c0d0a6041f35835d36e14ec255cae5fac2e6370b95a485c61ca35d5a7222d63bba6ee38bfc1107545a1e542286e0cff4d
-
Filesize
207KB
MD58b7097a908f41c9bf66bd56d9679d7c1
SHA19ea9f0d698bdc67422f91d3ed6cca8eafc1cfe98
SHA2560d1e0de8a7bdf09f58c88cc71872a050e1e91f47a5e09edb9d9ed7a63451386e
SHA51273154416e893b19aff79afff5e5e307c0d0a6041f35835d36e14ec255cae5fac2e6370b95a485c61ca35d5a7222d63bba6ee38bfc1107545a1e542286e0cff4d
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f