Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 13:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Metamorph.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Metamorph.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Metamorph.exe
-
Size
679KB
-
MD5
1fca81b4c9dbee44c78b0b704a31046c
-
SHA1
b388ddf07e110d79ada6a365aadd028916e7a9a5
-
SHA256
3edb4048164c839dc52eb7b03657626b48d38f30f92dabf44e873e11c9ba6e4d
-
SHA512
50b00d9da3aa6dea2a2c03e3e3f77fc2e6e652f1627b6e339c9f7e0ae8088ee7aff14ed581fa32900533a93a9f3927171a3bf35becd2f5bfa95487afae65a79f
-
SSDEEP
12288:1bWTYdoIo0RMwBFSRuibPoIovlJTSp8WR4XF0xr:1bWTYpo0jFu5jCldy8WR4Kr
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\RDErDFsPeMgETcTCTHqDhcrJSH\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\RDErDFsPeMgETcTCTHqDhcrJSH" Metamorph.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2064 Metamorph.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2064 Metamorph.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2916 2064 Metamorph.exe 29 PID 2064 wrote to memory of 2916 2064 Metamorph.exe 29 PID 2064 wrote to memory of 2916 2064 Metamorph.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Metamorph.exe"C:\Users\Admin\AppData\Local\Temp\Metamorph.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2916
-