Analysis

  • max time kernel
    130s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28/02/2021, 07:09 UTC

General

  • Target

    0048bbede90d7a4f6e980d38e7ddcfaf3fa4a87a1ac37cfd1b121e970d6c2810.exe

  • Size

    78KB

  • MD5

    9b4497259f9f858244023de231400892

  • SHA1

    08600ea0e22ae8e5168ec56a359d75ae2cf9b413

  • SHA256

    0048bbede90d7a4f6e980d38e7ddcfaf3fa4a87a1ac37cfd1b121e970d6c2810

  • SHA512

    777ffca5982119d346d601c4a6b2e4cefae9e5c05b29312c0676d6ed45478d829524ff3a14885a6fc2e4a27235ad897021342b71665f890ccca2a575397432a4

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0048bbede90d7a4f6e980d38e7ddcfaf3fa4a87a1ac37cfd1b121e970d6c2810.exe
    "C:\Users\Admin\AppData\Local\Temp\0048bbede90d7a4f6e980d38e7ddcfaf3fa4a87a1ac37cfd1b121e970d6c2810.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ck5jwbqb.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2D58.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2D57.tmp"
        3⤵
          PID:1172
      • C:\Users\Admin\AppData\Local\Temp\tmp2BD1.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp2BD1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0048bbede90d7a4f6e980d38e7ddcfaf3fa4a87a1ac37cfd1b121e970d6c2810.exe
        2⤵
        • Executes dropped EXE
        • Deletes itself
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1968

    Network

    • flag-us
      DNS
      bejnz.com
      tmp2BD1.tmp.exe
      Remote address:
      8.8.8.8:53
      Request
      bejnz.com
      IN A
      Response
      bejnz.com
      IN A
      35.205.61.67
    • flag-be
      GET
      http://bejnz.com/IP.php
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /IP.php HTTP/1.1
      Host: bejnz.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:09:29 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=1312b7c3fa482e22b346557afca7ccbe|154.61.71.51|1614496169|1614496169|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      DNS
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:10:33 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=26fd52fd58ea10a9af676dc26339627b|154.61.71.51|1614496233|1614496233|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/1
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /1 HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:10:33 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=48c411b20a5c38337faec672571e0ba7|154.61.71.51|1614496233|1614496233|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/1
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /1 HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:10:40 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=f8643bf88b64fc05a73ce8ae384c32a1|154.61.71.51|1614496240|1614496240|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/1
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /1 HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:10:41 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=447cee6c4a43cf75475f05d0ce9f9f7f|154.61.71.51|1614496241|1614496241|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      DNS
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:11:05 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=43400511c24f3dde7c04236673a5acbb|154.61.71.51|1614496265|1614496265|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/IP.php
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /IP.php HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:11:11 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=cca40351dcf1000de0937af3c66679f7|154.61.71.51|1614496271|1614496271|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/1
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /1 HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:11:12 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=32f251454d0be5c07ef9079189310c96|154.61.71.51|1614496272|1614496272|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/1
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /1 HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:11:12 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=4d5c71811b7bdd73ebede5dadfa82879|154.61.71.51|1614496272|1614496272|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/1
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /1 HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:11:14 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=ff3e916c30aa17e18abf5164c735e139|154.61.71.51|1614496274|1614496274|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • flag-be
      GET
      http://bejnz.com/1
      tmp2BD1.tmp.exe
      Remote address:
      35.205.61.67:80
      Request
      GET /1 HTTP/1.1
      Host: bejnz.com
      Response
      HTTP/1.1 302 Moved Temporarily
      Server: nginx
      Date: Sun, 28 Feb 2021 07:11:28 GMT
      Content-Type: text/html
      Connection: close
      Set-Cookie: btst=ba416f78fb5653047fc423e8ace8830a|154.61.71.51|1614496288|1614496288|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
      Location: 1
    • 35.205.61.67:80
      http://bejnz.com/IP.php
      http
      tmp2BD1.tmp.exe
      617 B
      768 B
      12
      5

      HTTP Request

      GET http://bejnz.com/IP.php

      HTTP Response

      302
    • 35.205.61.67:80
      bejnz.com
      http
      tmp2BD1.tmp.exe
      1.0kB
      808 B
      18
      6

      HTTP Response

      302
    • 35.205.61.67:80
      http://bejnz.com/1
      http
      tmp2BD1.tmp.exe
      312 B
      486 B
      6
      5

      HTTP Request

      GET http://bejnz.com/1

      HTTP Response

      302
    • 35.205.61.67:80
      http://bejnz.com/1
      http
      tmp2BD1.tmp.exe
      440 B
      486 B
      8
      5

      HTTP Request

      GET http://bejnz.com/1

      HTTP Response

      302
    • 35.205.61.67:80
      http://bejnz.com/1
      http
      tmp2BD1.tmp.exe
      266 B
      486 B
      5
      5

      HTTP Request

      GET http://bejnz.com/1

      HTTP Response

      302
    • 35.205.61.67:80
      bejnz.com
      http
      tmp2BD1.tmp.exe
      654 B
      486 B
      13
      5

      HTTP Response

      302
    • 35.205.61.67:80
      bejnz.com
      tmp2BD1.tmp.exe
      52 B
      1
    • 35.205.61.67:80
      http://bejnz.com/IP.php
      http
      tmp2BD1.tmp.exe
      415 B
      808 B
      8
      6

      HTTP Request

      GET http://bejnz.com/IP.php

      HTTP Response

      302
    • 35.205.61.67:80
      http://bejnz.com/1
      http
      tmp2BD1.tmp.exe
      572 B
      486 B
      11
      5

      HTTP Request

      GET http://bejnz.com/1

      HTTP Response

      302
    • 35.205.61.67:80
      http://bejnz.com/1
      http
      tmp2BD1.tmp.exe
      634 B
      1.5kB
      13
      8

      HTTP Request

      GET http://bejnz.com/1

      HTTP Response

      302
    • 35.205.61.67:80
      http://bejnz.com/1
      http
      tmp2BD1.tmp.exe
      562 B
      638 B
      10
      8

      HTTP Request

      GET http://bejnz.com/1

      HTTP Response

      302
    • 35.205.61.67:80
      http://bejnz.com/1
      http
      tmp2BD1.tmp.exe
      470 B
      486 B
      8
      5

      HTTP Request

      GET http://bejnz.com/1

      HTTP Response

      302
    • 35.205.61.67:80
      bejnz.com
      tmp2BD1.tmp.exe
      152 B
      3
    • 127.0.0.1:127
      tmp2BD1.tmp.exe
    • 8.8.8.8:53
      bejnz.com
      dns
      tmp2BD1.tmp.exe
      55 B
      71 B
      1
      1

      DNS Request

      bejnz.com

      DNS Response

      35.205.61.67

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1724-2-0x00000000761E1000-0x00000000761E3000-memory.dmp

      Filesize

      8KB

    • memory/1724-11-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/1900-12-0x0000000001D60000-0x0000000001D61000-memory.dmp

      Filesize

      4KB

    • memory/1968-18-0x0000000001F10000-0x0000000001F11000-memory.dmp

      Filesize

      4KB

    • memory/1968-19-0x0000000001F15000-0x0000000001F26000-memory.dmp

      Filesize

      68KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.