Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
8d11cf09b72483f65116d20e2159b55a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8d11cf09b72483f65116d20e2159b55a.exe
Resource
win10v2004-20231222-en
General
-
Target
8d11cf09b72483f65116d20e2159b55a.exe
-
Size
78KB
-
MD5
8d11cf09b72483f65116d20e2159b55a
-
SHA1
0845639d8ca95f282e0e7424c0d2d847bac47143
-
SHA256
49a8d5fbe4f8a2a70cf36c62a809986d0d05b7303d93791e3be63959bf7549b7
-
SHA512
a1ee0c66545df3a5348df9f4ce649d3eef1d96f28eb6db1f05aaf4a0910542a402d55cbd34f53b501824f889f4eeb1d0d5e092a2aea1132b18fbf60cc40a5699
-
SSDEEP
1536:Ghe5pXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQt96Vt9/O1sp:Ce5ZSyRxvY3md+dWWZy89/b
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 8d11cf09b72483f65116d20e2159b55a.exe -
Deletes itself 1 IoCs
pid Process 5036 tmp4508.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 5036 tmp4508.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp4508.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4312 8d11cf09b72483f65116d20e2159b55a.exe Token: SeDebugPrivilege 5036 tmp4508.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4312 wrote to memory of 5060 4312 8d11cf09b72483f65116d20e2159b55a.exe 18 PID 4312 wrote to memory of 5060 4312 8d11cf09b72483f65116d20e2159b55a.exe 18 PID 4312 wrote to memory of 5060 4312 8d11cf09b72483f65116d20e2159b55a.exe 18 PID 5060 wrote to memory of 4768 5060 vbc.exe 20 PID 5060 wrote to memory of 4768 5060 vbc.exe 20 PID 5060 wrote to memory of 4768 5060 vbc.exe 20 PID 4312 wrote to memory of 5036 4312 8d11cf09b72483f65116d20e2159b55a.exe 21 PID 4312 wrote to memory of 5036 4312 8d11cf09b72483f65116d20e2159b55a.exe 21 PID 4312 wrote to memory of 5036 4312 8d11cf09b72483f65116d20e2159b55a.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d11cf09b72483f65116d20e2159b55a.exe"C:\Users\Admin\AppData\Local\Temp\8d11cf09b72483f65116d20e2159b55a.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oqjzda92.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES45A4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6AF8919DDDF74BF388959BCF18747AF.TMP"3⤵PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4508.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4508.tmp.exe" C:\Users\Admin\AppData\Local\Temp\8d11cf09b72483f65116d20e2159b55a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5775ae8b507b002dbc6feaeec9e69250e
SHA11cf2ee934f4fdf9531b3dbf83ac3e4700240f211
SHA256f63ed7b21b892a40f6615221da4d3049d8f2e052d6a8b76d6565c6da630ea604
SHA512e7164a6e02ca862f3df59a71b6f1b319ccc7b85b7843f4b824b8cc8ff34c8440cc1d7c834e4fa8f4c5f37d058c9c112d5b0902a1b7d86fff8acdc2b9fde35a8d
-
Filesize
14KB
MD50d5725576aa527dee20f219062471a9b
SHA19bcb8d815539efa257f9867c5fee045f81e1ba43
SHA2568fd5b9992e27cd7768485fdf2d53a48a2e6244052d0bfe7e039b6ac1a8439fa0
SHA51282e2f94f71196ed660535bd5618e2cdef0ced51a4e392f34fbc9ddabbb798c2de0102fef6949dd446d1bde72314a9551f4b2453dd6b1eb3828a74cdd64b6b14f
-
Filesize
266B
MD5614ccb3b2f869875558df9d940e22f24
SHA1d6c07d109a94135f18cbbee7d296d24e4d6fc8c8
SHA256e5794f2367f0f4fa4fe67e3577b457e19845159fee927a7c15f6375fc9059e25
SHA51278869592e77f8e1533d75e6c64268c586e6bc06340886fa680d3630ff8a39d8f728573548a6e413ce69fc1644fd18e8d339c15ae4649c3a301838b20dad7d98a
-
Filesize
68KB
MD5e1ba2c8aa11c990f6eb05a9f513396bd
SHA1e88cfdd58cda9ffe311390d5961c547c9d5847fc
SHA2568ddc2e153dbd2ef62669242cd5c6ea07a14dec9b3b37515a0f2633cf93c9ee61
SHA51221e11a41ead8509b078ee5445d2f3a143a4a35210fc92dffa2791c46747a3461334afb32d62100a7bc4b4a154d23a4f0621861565190bfae52d86af21cef1d27
-
Filesize
78KB
MD53fcb59a2516ca8800fdde828913804ff
SHA16dbd56409b2b26cba60045a5fd08e063b6655a6b
SHA2566ed8579bffa797ed04395d19ca864666b18bc73bda7131d8a90d7d64154cdd87
SHA51234a057d52072a1bc6f167ab61d11abc368928ee357ce0b319f1e2ad42425df0462570b99efccafb41265af3c4200e7bb08a520e45b596453ce64d3568bcea565
-
Filesize
660B
MD5c078761f161fab01b06c1f51e34c505f
SHA1ea4c9ecc0490e493000076ccefe98e0baf775e0b
SHA256e47454dbaad02c40ac53b2989b4d6bbade96b701e3c933a0863c3be41be1f98f
SHA512438bcd49931ddf82e6a696d194539f70a27b6177ed73de943710f7a893deb41ba5205662df4a17a00bdfe53ddbe9b3382662dc9c34d23d1b1cb6c089def33592
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107