Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 14:34

General

  • Target

    2024-06-03_b747ee03230dd69e8fd8b7e3cc59c5ea_avoslocker_metamorfo.exe

  • Size

    2.3MB

  • MD5

    b747ee03230dd69e8fd8b7e3cc59c5ea

  • SHA1

    4240cc3448f1c9b4c42b427d67423b05f912f087

  • SHA256

    464da04b2082472d9faeb326e6ca71a09389a59e6fb1add847898250109f4e7b

  • SHA512

    e344d7aff8f0ae43ca4a418a02e9069d4bfc2f7fb84664742e821cade06a7ac531908f1829c443f20587571bf22ddef02069e90cc803ab45184b6a69a9052318

  • SSDEEP

    49152:Uf0fgV8ryyIarNnjmhtY4R96OZqcjjYsKaTHXHbpySwnPxl/:Uf0fOuNnKhtY4T6OZ58sKs396

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-03_b747ee03230dd69e8fd8b7e3cc59c5ea_avoslocker_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-03_b747ee03230dd69e8fd8b7e3cc59c5ea_avoslocker_metamorfo.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe" /REP="C:\Users\Admin\AppData\Local\Temp\" /SILENT /WAIT
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe" /REP="C:\Users\Admin\AppData\Local\Temp\" /SILENT /WAIT /RELANCE
        3⤵
        • Executes dropped EXE
        PID:2428

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\wd280hf.dll

          Filesize

          4.5MB

          MD5

          14f357ea2cf1376683d3c9365798af54

          SHA1

          9c702e3f300541700ed0292ad37adaaf3f79be6c

          SHA256

          d2aeec00c7632e8c96444f8fd7ea3b5a05f6c0b76cae10bb29194a8db8b221b1

          SHA512

          14536bc2ba1e02062e10db9500ea54424af47c23636d849a886f70bad77656efc43ffcf527a7c4d393322afc95b8549465fa79b833ec91330148fca8ed672874

        • C:\Users\Admin\AppData\Local\Temp\wd280mdl.dll

          Filesize

          3.9MB

          MD5

          f5a55f9deddc964c7ce90cc6ee897b5e

          SHA1

          784b702262c32bfc92835adae49ced354040ed6d

          SHA256

          194137f74af6ed584fcadfea6b4f7c2e1dc713510d3d0b23aa60644c00cd3bf0

          SHA512

          cdeb6e55b13a8117d817612cf743520833a1af58e9507baf3f869fdd9dacc85a4b1cf403cf7be22a24aa69085e3d8a19640f857b0d8133952627dbf766e9a207

        • C:\Users\Admin\AppData\Local\Temp\wd280obj.dll

          Filesize

          17.9MB

          MD5

          e457064438f76edea2ab5371be07186c

          SHA1

          1f2faad3a04cf83d693bec35855abdd8d33f9ec8

          SHA256

          f282d97cdeb505a043c0a0a856fee2f894129fa5387abf38029008b291506c27

          SHA512

          ad59b6a13de15360b15b90d5a98dc06a64ca42421578cd684a7859e2bb63a0413d2837c3a46715a5e91efc3c1ccdae65710dfde13ddd9464c4560fe8ab0f7d56

        • C:\Users\Admin\AppData\Local\Temp\wd280pdf.dll

          Filesize

          5.1MB

          MD5

          b25f6a18372d84c29a7b4d44d7f92634

          SHA1

          ccad3c7dcd8a7e1f1d70333e3d2a1da311429137

          SHA256

          8b60182fcc48632d75b61f52c60cdec688e5dbd3170be3f87ec01143e368d682

          SHA512

          47560b5c09cfec4a7763ea6df75ae8110f05ef180e78c9eaa6f71cb2459e2627a8fc211bace676c5832f140e6c5be6f0ce2bb9b1d4981272c3b933b251fb4aa5

        • C:\Users\Admin\AppData\Local\Temp\wd280pnt.dll

          Filesize

          2.1MB

          MD5

          20a994b3e4793af38b18ba783ba3e3a8

          SHA1

          88f6d6a668c2c28fa7217bd212c75351ace46e92

          SHA256

          81c168b5d7f9ccd920ce7ee55748a43e9b4a5dbea98b89001b2a9ebdbe59e8f9

          SHA512

          0b74e4b41afe3cc943cdb1619442a69a60590134280245d911314befc8e83600bafcb12db74afd2cfc054ea4a976d47ad8e1729bc62663c35144088233b598a3

        • C:\Users\Admin\AppData\Local\Temp\wd280std.dll

          Filesize

          3.0MB

          MD5

          7912dd97e5d2f18987605abaf6d168a8

          SHA1

          d912e182e65cbe48e7294a0092d02a40d9331be5

          SHA256

          9a83548a486c7177d6bc39e2b3002398b9f1734f1a330d735b1fd91c24b10cc5

          SHA512

          ff198e2648eafbf46ca544f01103e438af73cc6610b8556ce5999efc9abbd44b15af0b4ed7c41a48ed22c61dbc50914ea3b3e6c4940b8f5089c2c98295363b17

        • C:\Users\Admin\AppData\Local\Temp\wd280vm.dll

          Filesize

          5.1MB

          MD5

          56eb18ee8bfc9a759b39891c570aa58c

          SHA1

          3539000a585d6f7441d72433df2991c6637eea65

          SHA256

          3a65665f808fb549fa1ca16b43367c8149e2fb2148fec0682c66a69cbd9091ff

          SHA512

          0a3a7409b04cdf6eaaf21272138ad380a48bcb4374de40c007812b2ccac802b8e99b7b726a652ba7d9f11e0a3146c8e6f512ce288238861a7fb34a1d9a193721

        • memory/1560-1-0x0000000000390000-0x0000000000490000-memory.dmp

          Filesize

          1024KB

        • memory/1560-17-0x0000000000390000-0x0000000000490000-memory.dmp

          Filesize

          1024KB

        • memory/1560-157-0x0000000003620000-0x0000000003630000-memory.dmp

          Filesize

          64KB