Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-06-2023 13:33
Static task
static1
Behavioral task
behavioral1
Sample
77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe
Resource
win10-20230220-en
General
-
Target
77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe
-
Size
207KB
-
MD5
84d2ce6d0b5b8c42b1a7d1bc8a635e2f
-
SHA1
a50987cd28916fb4c91fc3ce11a5b3be2d48753a
-
SHA256
77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5
-
SHA512
999d0e3b6cb13389a0c384b18268da729809c64b9c748ca1255a352f06671074becc793969adf871649123c797c54fcc3da4e95cc5135a7efe16645d0ca73b2e
-
SSDEEP
3072:meTRJ0kHbnpN23kQKp5XzutZXKGrpeN84LuZAIybiy3xEfbi:FTR2AnpN2wDurXBeBuZAIMEj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2528 metado.exe 2320 metado.exe 3836 metado.exe 1236 metado.exe -
Loads dropped DLL 1 IoCs
pid Process 4348 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5104 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2528 1444 77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe 66 PID 1444 wrote to memory of 2528 1444 77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe 66 PID 1444 wrote to memory of 2528 1444 77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe 66 PID 2528 wrote to memory of 5104 2528 metado.exe 67 PID 2528 wrote to memory of 5104 2528 metado.exe 67 PID 2528 wrote to memory of 5104 2528 metado.exe 67 PID 2528 wrote to memory of 3980 2528 metado.exe 69 PID 2528 wrote to memory of 3980 2528 metado.exe 69 PID 2528 wrote to memory of 3980 2528 metado.exe 69 PID 3980 wrote to memory of 4232 3980 cmd.exe 71 PID 3980 wrote to memory of 4232 3980 cmd.exe 71 PID 3980 wrote to memory of 4232 3980 cmd.exe 71 PID 3980 wrote to memory of 4300 3980 cmd.exe 72 PID 3980 wrote to memory of 4300 3980 cmd.exe 72 PID 3980 wrote to memory of 4300 3980 cmd.exe 72 PID 3980 wrote to memory of 2804 3980 cmd.exe 73 PID 3980 wrote to memory of 2804 3980 cmd.exe 73 PID 3980 wrote to memory of 2804 3980 cmd.exe 73 PID 3980 wrote to memory of 1796 3980 cmd.exe 74 PID 3980 wrote to memory of 1796 3980 cmd.exe 74 PID 3980 wrote to memory of 1796 3980 cmd.exe 74 PID 3980 wrote to memory of 2764 3980 cmd.exe 75 PID 3980 wrote to memory of 2764 3980 cmd.exe 75 PID 3980 wrote to memory of 2764 3980 cmd.exe 75 PID 3980 wrote to memory of 4568 3980 cmd.exe 76 PID 3980 wrote to memory of 4568 3980 cmd.exe 76 PID 3980 wrote to memory of 4568 3980 cmd.exe 76 PID 2528 wrote to memory of 4348 2528 metado.exe 78 PID 2528 wrote to memory of 4348 2528 metado.exe 78 PID 2528 wrote to memory of 4348 2528 metado.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe"C:\Users\Admin\AppData\Local\Temp\77ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F3⤵
- Creates scheduled task(s)
PID:5104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:N"4⤵PID:4300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metado.exe" /P "Admin:R" /E4⤵PID:2804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:N"4⤵PID:2764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\a9e2a16078" /P "Admin:R" /E4⤵PID:4568
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4348
-
-
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:2320
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:3836
-
C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exeC:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe1⤵
- Executes dropped EXE
PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD584d2ce6d0b5b8c42b1a7d1bc8a635e2f
SHA1a50987cd28916fb4c91fc3ce11a5b3be2d48753a
SHA25677ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5
SHA512999d0e3b6cb13389a0c384b18268da729809c64b9c748ca1255a352f06671074becc793969adf871649123c797c54fcc3da4e95cc5135a7efe16645d0ca73b2e
-
Filesize
207KB
MD584d2ce6d0b5b8c42b1a7d1bc8a635e2f
SHA1a50987cd28916fb4c91fc3ce11a5b3be2d48753a
SHA25677ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5
SHA512999d0e3b6cb13389a0c384b18268da729809c64b9c748ca1255a352f06671074becc793969adf871649123c797c54fcc3da4e95cc5135a7efe16645d0ca73b2e
-
Filesize
207KB
MD584d2ce6d0b5b8c42b1a7d1bc8a635e2f
SHA1a50987cd28916fb4c91fc3ce11a5b3be2d48753a
SHA25677ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5
SHA512999d0e3b6cb13389a0c384b18268da729809c64b9c748ca1255a352f06671074becc793969adf871649123c797c54fcc3da4e95cc5135a7efe16645d0ca73b2e
-
Filesize
207KB
MD584d2ce6d0b5b8c42b1a7d1bc8a635e2f
SHA1a50987cd28916fb4c91fc3ce11a5b3be2d48753a
SHA25677ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5
SHA512999d0e3b6cb13389a0c384b18268da729809c64b9c748ca1255a352f06671074becc793969adf871649123c797c54fcc3da4e95cc5135a7efe16645d0ca73b2e
-
Filesize
207KB
MD584d2ce6d0b5b8c42b1a7d1bc8a635e2f
SHA1a50987cd28916fb4c91fc3ce11a5b3be2d48753a
SHA25677ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5
SHA512999d0e3b6cb13389a0c384b18268da729809c64b9c748ca1255a352f06671074becc793969adf871649123c797c54fcc3da4e95cc5135a7efe16645d0ca73b2e
-
Filesize
207KB
MD584d2ce6d0b5b8c42b1a7d1bc8a635e2f
SHA1a50987cd28916fb4c91fc3ce11a5b3be2d48753a
SHA25677ac40540c3d6e4352e831ad05522131712d08176021fa722c824f5ce43329c5
SHA512999d0e3b6cb13389a0c384b18268da729809c64b9c748ca1255a352f06671074becc793969adf871649123c797c54fcc3da4e95cc5135a7efe16645d0ca73b2e
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD5547bae937be965d63f61d89e8eafb4a1
SHA185466c95625bcbb7f68aa89a367149d35f80e1fa
SHA256015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5
SHA5121869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f