Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
49d03048e717add17d2229db85edfb00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49d03048e717add17d2229db85edfb00.exe
Resource
win10v2004-20231215-en
General
-
Target
49d03048e717add17d2229db85edfb00.exe
-
Size
78KB
-
MD5
49d03048e717add17d2229db85edfb00
-
SHA1
5a21fbd0696daee13e740fcbce316e3eab251e27
-
SHA256
253b7724d4ffc202f44f17e9e5b0a6dc210ac5cf925e03a1aa0a0cefbe8e9b2d
-
SHA512
5eb33d968c505fc771080d2b2e921f2b753f245128b3d93e406310d1901a2765820475907a5d5296ba62acc187a7abb963aee797ffcb32e5052ffc1e58814b99
-
SSDEEP
1536:6sHY6M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtw9/Jm1p7:6sHYn3xSyRxvY3md+dWWZyw9/w
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 49d03048e717add17d2229db85edfb00.exe -
Executes dropped EXE 1 IoCs
pid Process 4244 tmp87FC.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp87FC.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4008 49d03048e717add17d2229db85edfb00.exe Token: SeDebugPrivilege 4244 tmp87FC.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4008 wrote to memory of 2436 4008 49d03048e717add17d2229db85edfb00.exe 93 PID 4008 wrote to memory of 2436 4008 49d03048e717add17d2229db85edfb00.exe 93 PID 4008 wrote to memory of 2436 4008 49d03048e717add17d2229db85edfb00.exe 93 PID 2436 wrote to memory of 1592 2436 vbc.exe 94 PID 2436 wrote to memory of 1592 2436 vbc.exe 94 PID 2436 wrote to memory of 1592 2436 vbc.exe 94 PID 4008 wrote to memory of 4244 4008 49d03048e717add17d2229db85edfb00.exe 95 PID 4008 wrote to memory of 4244 4008 49d03048e717add17d2229db85edfb00.exe 95 PID 4008 wrote to memory of 4244 4008 49d03048e717add17d2229db85edfb00.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00.exe"C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z9rwdtgm.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8993.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc442882DC2E54447BBCC16CA3A39B8D40.TMP"3⤵PID:1592
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp87FC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp87FC.tmp.exe" C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4244
-