Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 18:42

General

  • Target

    8d11cf09b72483f65116d20e2159b55a.exe

  • Size

    78KB

  • MD5

    8d11cf09b72483f65116d20e2159b55a

  • SHA1

    0845639d8ca95f282e0e7424c0d2d847bac47143

  • SHA256

    49a8d5fbe4f8a2a70cf36c62a809986d0d05b7303d93791e3be63959bf7549b7

  • SHA512

    a1ee0c66545df3a5348df9f4ce649d3eef1d96f28eb6db1f05aaf4a0910542a402d55cbd34f53b501824f889f4eeb1d0d5e092a2aea1132b18fbf60cc40a5699

  • SSDEEP

    1536:Ghe5pXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQt96Vt9/O1sp:Ce5ZSyRxvY3md+dWWZy89/b

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d11cf09b72483f65116d20e2159b55a.exe
    "C:\Users\Admin\AppData\Local\Temp\8d11cf09b72483f65116d20e2159b55a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oqjzda92.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES45A4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6AF8919DDDF74BF388959BCF18747AF.TMP"
        3⤵
          PID:4768
      • C:\Users\Admin\AppData\Local\Temp\tmp4508.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp4508.tmp.exe" C:\Users\Admin\AppData\Local\Temp\8d11cf09b72483f65116d20e2159b55a.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:5036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES45A4.tmp

      Filesize

      1KB

      MD5

      775ae8b507b002dbc6feaeec9e69250e

      SHA1

      1cf2ee934f4fdf9531b3dbf83ac3e4700240f211

      SHA256

      f63ed7b21b892a40f6615221da4d3049d8f2e052d6a8b76d6565c6da630ea604

      SHA512

      e7164a6e02ca862f3df59a71b6f1b319ccc7b85b7843f4b824b8cc8ff34c8440cc1d7c834e4fa8f4c5f37d058c9c112d5b0902a1b7d86fff8acdc2b9fde35a8d

    • C:\Users\Admin\AppData\Local\Temp\oqjzda92.0.vb

      Filesize

      14KB

      MD5

      0d5725576aa527dee20f219062471a9b

      SHA1

      9bcb8d815539efa257f9867c5fee045f81e1ba43

      SHA256

      8fd5b9992e27cd7768485fdf2d53a48a2e6244052d0bfe7e039b6ac1a8439fa0

      SHA512

      82e2f94f71196ed660535bd5618e2cdef0ced51a4e392f34fbc9ddabbb798c2de0102fef6949dd446d1bde72314a9551f4b2453dd6b1eb3828a74cdd64b6b14f

    • C:\Users\Admin\AppData\Local\Temp\oqjzda92.cmdline

      Filesize

      266B

      MD5

      614ccb3b2f869875558df9d940e22f24

      SHA1

      d6c07d109a94135f18cbbee7d296d24e4d6fc8c8

      SHA256

      e5794f2367f0f4fa4fe67e3577b457e19845159fee927a7c15f6375fc9059e25

      SHA512

      78869592e77f8e1533d75e6c64268c586e6bc06340886fa680d3630ff8a39d8f728573548a6e413ce69fc1644fd18e8d339c15ae4649c3a301838b20dad7d98a

    • C:\Users\Admin\AppData\Local\Temp\tmp4508.tmp.exe

      Filesize

      68KB

      MD5

      e1ba2c8aa11c990f6eb05a9f513396bd

      SHA1

      e88cfdd58cda9ffe311390d5961c547c9d5847fc

      SHA256

      8ddc2e153dbd2ef62669242cd5c6ea07a14dec9b3b37515a0f2633cf93c9ee61

      SHA512

      21e11a41ead8509b078ee5445d2f3a143a4a35210fc92dffa2791c46747a3461334afb32d62100a7bc4b4a154d23a4f0621861565190bfae52d86af21cef1d27

    • C:\Users\Admin\AppData\Local\Temp\tmp4508.tmp.exe

      Filesize

      78KB

      MD5

      3fcb59a2516ca8800fdde828913804ff

      SHA1

      6dbd56409b2b26cba60045a5fd08e063b6655a6b

      SHA256

      6ed8579bffa797ed04395d19ca864666b18bc73bda7131d8a90d7d64154cdd87

      SHA512

      34a057d52072a1bc6f167ab61d11abc368928ee357ce0b319f1e2ad42425df0462570b99efccafb41265af3c4200e7bb08a520e45b596453ce64d3568bcea565

    • C:\Users\Admin\AppData\Local\Temp\vbc6AF8919DDDF74BF388959BCF18747AF.TMP

      Filesize

      660B

      MD5

      c078761f161fab01b06c1f51e34c505f

      SHA1

      ea4c9ecc0490e493000076ccefe98e0baf775e0b

      SHA256

      e47454dbaad02c40ac53b2989b4d6bbade96b701e3c933a0863c3be41be1f98f

      SHA512

      438bcd49931ddf82e6a696d194539f70a27b6177ed73de943710f7a893deb41ba5205662df4a17a00bdfe53ddbe9b3382662dc9c34d23d1b1cb6c089def33592

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      4f0e8cf79edb6cd381474b21cabfdf4a

      SHA1

      7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

      SHA256

      e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

      SHA512

      2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

    • memory/4312-2-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/4312-21-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/4312-1-0x0000000000A50000-0x0000000000A60000-memory.dmp

      Filesize

      64KB

    • memory/4312-0-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/5036-23-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/5036-22-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/5036-25-0x0000000001000000-0x0000000001010000-memory.dmp

      Filesize

      64KB

    • memory/5036-26-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/5036-27-0x0000000001000000-0x0000000001010000-memory.dmp

      Filesize

      64KB

    • memory/5060-8-0x00000000025D0000-0x00000000025E0000-memory.dmp

      Filesize

      64KB