Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
49d03048e717add17d2229db85edfb00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49d03048e717add17d2229db85edfb00.exe
Resource
win10v2004-20231215-en
General
-
Target
49d03048e717add17d2229db85edfb00.exe
-
Size
78KB
-
MD5
49d03048e717add17d2229db85edfb00
-
SHA1
5a21fbd0696daee13e740fcbce316e3eab251e27
-
SHA256
253b7724d4ffc202f44f17e9e5b0a6dc210ac5cf925e03a1aa0a0cefbe8e9b2d
-
SHA512
5eb33d968c505fc771080d2b2e921f2b753f245128b3d93e406310d1901a2765820475907a5d5296ba62acc187a7abb963aee797ffcb32e5052ffc1e58814b99
-
SSDEEP
1536:6sHY6M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtw9/Jm1p7:6sHYn3xSyRxvY3md+dWWZyw9/w
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2740 tmp5F8E.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2400 49d03048e717add17d2229db85edfb00.exe 2400 49d03048e717add17d2229db85edfb00.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp5F8E.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2400 49d03048e717add17d2229db85edfb00.exe Token: SeDebugPrivilege 2740 tmp5F8E.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1292 2400 49d03048e717add17d2229db85edfb00.exe 28 PID 2400 wrote to memory of 1292 2400 49d03048e717add17d2229db85edfb00.exe 28 PID 2400 wrote to memory of 1292 2400 49d03048e717add17d2229db85edfb00.exe 28 PID 2400 wrote to memory of 1292 2400 49d03048e717add17d2229db85edfb00.exe 28 PID 1292 wrote to memory of 2872 1292 vbc.exe 30 PID 1292 wrote to memory of 2872 1292 vbc.exe 30 PID 1292 wrote to memory of 2872 1292 vbc.exe 30 PID 1292 wrote to memory of 2872 1292 vbc.exe 30 PID 2400 wrote to memory of 2740 2400 49d03048e717add17d2229db85edfb00.exe 31 PID 2400 wrote to memory of 2740 2400 49d03048e717add17d2229db85edfb00.exe 31 PID 2400 wrote to memory of 2740 2400 49d03048e717add17d2229db85edfb00.exe 31 PID 2400 wrote to memory of 2740 2400 49d03048e717add17d2229db85edfb00.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00.exe"C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mftmzzas.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6327.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6316.tmp"3⤵PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5F8E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5F8E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD54d4592b7b2863972d5fddaf4ac700db8
SHA1022233636aef832db921d7a63b9d81a7fdcc7e15
SHA25631c13c198dc9f9fa2e642ab40ac67875fdbb5bffe4c63308272afaf736eaede5
SHA512c0e1ac162a1e995d626440f11268b8335c92d7c936e441e689cbec9ad249147c14291aa9e6c4bbe2ff6b13fbeecd57c21ef68cbc4c13bbfa923dd603c221839e