Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
e08c72efa7445bed749b9ae18f8ee52f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e08c72efa7445bed749b9ae18f8ee52f.exe
Resource
win10v2004-20240319-en
General
-
Target
e08c72efa7445bed749b9ae18f8ee52f.exe
-
Size
78KB
-
MD5
e08c72efa7445bed749b9ae18f8ee52f
-
SHA1
b6fa45dd676ed0ab33d1c53985b18bd2fbb8026a
-
SHA256
551bc2bb30074ddca44e435ab475d51497f51ad7bb81c011c3e3f21ed618fad0
-
SHA512
58fe460dd77c8fd8788ab663edb99685e3db75cac33f44d5f87a3b038ab50545201d5e5e0d2039e00dc4d4ca88523916e366505b5274d87f5bd227c4956d0110
-
SSDEEP
1536:avWV5zpJywt04wbje3IgTazcoOEEQLwdCRoaeuProYMHQti6P9/lmC1st:EWV5NJywQjDgTLopLwdCFJz39/kH
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2520 tmp1084.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 2964 e08c72efa7445bed749b9ae18f8ee52f.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 e08c72efa7445bed749b9ae18f8ee52f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2992 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 28 PID 2964 wrote to memory of 2992 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 28 PID 2964 wrote to memory of 2992 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 28 PID 2964 wrote to memory of 2992 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 28 PID 2992 wrote to memory of 2644 2992 vbc.exe 30 PID 2992 wrote to memory of 2644 2992 vbc.exe 30 PID 2992 wrote to memory of 2644 2992 vbc.exe 30 PID 2992 wrote to memory of 2644 2992 vbc.exe 30 PID 2964 wrote to memory of 2520 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 31 PID 2964 wrote to memory of 2520 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 31 PID 2964 wrote to memory of 2520 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 31 PID 2964 wrote to memory of 2520 2964 e08c72efa7445bed749b9ae18f8ee52f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e08c72efa7445bed749b9ae18f8ee52f.exe"C:\Users\Admin\AppData\Local\Temp\e08c72efa7445bed749b9ae18f8ee52f.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6hd2p8tu.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10F3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc10F2.tmp"3⤵PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1084.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1084.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e08c72efa7445bed749b9ae18f8ee52f.exe2⤵
- Executes dropped EXE
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD57fe692e5127ee5ecd7c31da76985f34c
SHA1398ed3a8792ccf8e6d46fb109aa75ece92bd92ae
SHA2566c8a975d6c400b717afd34396439ccc148cca6aa6859a5d0ad69403b1ccecc4a
SHA512c90095cdbf47857b7fb52f7d071af5e3efa030fa435819635d2ccf6b780bb14c591860234d4ee219cfd6821569b33b3026654239683e490fd14c6275a426ff8d
-
Filesize
266B
MD517c98851c56f283e663e110856369ef1
SHA1afb23cacdb7adff860c937b06867686d478f1122
SHA2567fa0761373ba500c32b5815742ec18bdaa3d666e9f3b08ca13cee823ee8ef15a
SHA512ba3460c9e73eaa50329ae94cc34307c02bbae5ef89670e67e5bdb4a889448782b35a2899138a92c58f06f3f7364156b00765d5e17871ee8f437f1ed5849c4e97
-
Filesize
1KB
MD5293954d966083ba69432bbeaf2323b51
SHA1f537e145b2832239dedf1dabef4eb67331f614d0
SHA256050cabf421c952788faf22cd595395a8a150063f46e4629dfe6b6c5d40b238f2
SHA51284ffb0186fd09fbf3b94e8f7a28fb632b9c20a19604f9f4ac0a7d51e77a78fb48558d531a5420e79b0cdc6829cbd42d596743fbe287535f807a3c13c1fb7205c
-
Filesize
78KB
MD51e0979ed27e5a926ebcd6f1589a7e5a8
SHA16d18d07e8c8daf615da2ce4bf216e120ce158067
SHA256d7a690cb257401ade6ccc101e6bd66bd40f2cfdcb81c24bc168f17a1c713e95f
SHA512feb64a38aa7561a4c880a5d7c014e9605d5ce16d070dbc1e5f59ca7645386d5fd88df58904c7883d83f75e8855facbd429880a3132f37f626bf2a870c6ca459c
-
Filesize
660B
MD5dc18cf85aa1577b8df27e912b718ddec
SHA1db94b6c9e511cbca452c36b3464562ea4f782141
SHA25602122c66b8a2df54e525d37dbfa2a3948d6ca6aea8ea7c901d9f95f826ccc56e
SHA512b5654ade04cede63764eb8276113d79d93ec461da754a71f5341e4acf6f275a12c074ffdd9f5d948a57acbc611dc27e85603ebc121357955e3a31b16267c3a8a
-
Filesize
62KB
MD5484967ab9def8ff17dd55476ca137721
SHA1a84012f673fe1ac9041e7827cc3de4b20a1194e2
SHA2569c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b
SHA5121e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7