Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 23:41
Behavioral task
behavioral1
Sample
2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe
-
Size
4.8MB
-
MD5
2a88c58ed063b4f85628c3c8824b0287
-
SHA1
27554cfd95867b42651db69d789d62e72da9400f
-
SHA256
272772d4656e66f81d00710f2b8992dccb52daa9dcda18dfd6bccbb0629f4109
-
SHA512
5ea54482beb716ef6d5406a0f7a72e066250327f8b067c3fe9297285b9c1dd3e5d098bba000d50db896b0758c97b3fc2611aac2950a9cb6b103abf70a7baf290
-
SSDEEP
98304:BtiuhouhmF1OgPptZDElaxQ3PCTDsRnLPYSz7LyZ:rvktIa6n3LyZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe -
Executes dropped EXE 2 IoCs
pid Process 4660 ITS SB App Switch.exe 3740 ITS SB App Switch.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 3740 ITS SB App Switch.exe 3740 ITS SB App Switch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2184 wrote to memory of 4660 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 81 PID 2184 wrote to memory of 4660 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 81 PID 2184 wrote to memory of 4660 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 81 PID 2184 wrote to memory of 3740 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 82 PID 2184 wrote to memory of 3740 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 82 PID 2184 wrote to memory of 3740 2184 2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo\ITS SB App Switch.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo\ITS SB App Switch.exe"2⤵
- Executes dropped EXE
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo\ITS SB App Switch.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo\ITS SB App Switch.exe" 21842⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo\ITS SB App Switch.exe
Filesize370KB
MD56e3b18cac5d61c109906e94ce895d2bc
SHA1557d63dd72dc47e9b2d701c40e80fba1e108e9c5
SHA256db70869cfafb8877fd02beb9d970427e6103c1003d04eca2dad1ac9a9587d489
SHA512e27d2cf4e63b414b7a8e89c48e9b4c0ccb93e52c2405e9b5bbac13352daa3cf9e619b48845547ebdbfaa7ef8af850f1c3fe4b8ac228dfa3d14095d86cf82340b
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_2a88c58ed063b4f85628c3c8824b0287_avoslocker_metamorfo\TestSecurity.12.7.0.249.dll
Filesize1.6MB
MD5a7d19e10c06f0b71f69c15e0c070f66a
SHA111a10b61e3925125b963e3074dea63f36084da23
SHA2566b766ffee9ee5ebeee3830a90870afca99a79e7611fd81f2e4afab009513a3dc
SHA51209cc5eff3529881d540ac96cf5fe488dc843d131d7c4527b2dbc4349c048a1cd2d1f190365f174d5972624805d07b84d513aa274144bd2974ced2ec57e2ed758