Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 02:27

General

  • Target

    e08c72efa7445bed749b9ae18f8ee52f.exe

  • Size

    78KB

  • MD5

    e08c72efa7445bed749b9ae18f8ee52f

  • SHA1

    b6fa45dd676ed0ab33d1c53985b18bd2fbb8026a

  • SHA256

    551bc2bb30074ddca44e435ab475d51497f51ad7bb81c011c3e3f21ed618fad0

  • SHA512

    58fe460dd77c8fd8788ab663edb99685e3db75cac33f44d5f87a3b038ab50545201d5e5e0d2039e00dc4d4ca88523916e366505b5274d87f5bd227c4956d0110

  • SSDEEP

    1536:avWV5zpJywt04wbje3IgTazcoOEEQLwdCRoaeuProYMHQti6P9/lmC1st:EWV5NJywQjDgTLopLwdCFJz39/kH

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e08c72efa7445bed749b9ae18f8ee52f.exe
    "C:\Users\Admin\AppData\Local\Temp\e08c72efa7445bed749b9ae18f8ee52f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6hd2p8tu.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10F3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc10F2.tmp"
        3⤵
          PID:2644
      • C:\Users\Admin\AppData\Local\Temp\tmp1084.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp1084.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e08c72efa7445bed749b9ae18f8ee52f.exe
        2⤵
        • Executes dropped EXE
        PID:2520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6hd2p8tu.0.vb

      Filesize

      14KB

      MD5

      7fe692e5127ee5ecd7c31da76985f34c

      SHA1

      398ed3a8792ccf8e6d46fb109aa75ece92bd92ae

      SHA256

      6c8a975d6c400b717afd34396439ccc148cca6aa6859a5d0ad69403b1ccecc4a

      SHA512

      c90095cdbf47857b7fb52f7d071af5e3efa030fa435819635d2ccf6b780bb14c591860234d4ee219cfd6821569b33b3026654239683e490fd14c6275a426ff8d

    • C:\Users\Admin\AppData\Local\Temp\6hd2p8tu.cmdline

      Filesize

      266B

      MD5

      17c98851c56f283e663e110856369ef1

      SHA1

      afb23cacdb7adff860c937b06867686d478f1122

      SHA256

      7fa0761373ba500c32b5815742ec18bdaa3d666e9f3b08ca13cee823ee8ef15a

      SHA512

      ba3460c9e73eaa50329ae94cc34307c02bbae5ef89670e67e5bdb4a889448782b35a2899138a92c58f06f3f7364156b00765d5e17871ee8f437f1ed5849c4e97

    • C:\Users\Admin\AppData\Local\Temp\RES10F3.tmp

      Filesize

      1KB

      MD5

      293954d966083ba69432bbeaf2323b51

      SHA1

      f537e145b2832239dedf1dabef4eb67331f614d0

      SHA256

      050cabf421c952788faf22cd595395a8a150063f46e4629dfe6b6c5d40b238f2

      SHA512

      84ffb0186fd09fbf3b94e8f7a28fb632b9c20a19604f9f4ac0a7d51e77a78fb48558d531a5420e79b0cdc6829cbd42d596743fbe287535f807a3c13c1fb7205c

    • C:\Users\Admin\AppData\Local\Temp\tmp1084.tmp.exe

      Filesize

      78KB

      MD5

      1e0979ed27e5a926ebcd6f1589a7e5a8

      SHA1

      6d18d07e8c8daf615da2ce4bf216e120ce158067

      SHA256

      d7a690cb257401ade6ccc101e6bd66bd40f2cfdcb81c24bc168f17a1c713e95f

      SHA512

      feb64a38aa7561a4c880a5d7c014e9605d5ce16d070dbc1e5f59ca7645386d5fd88df58904c7883d83f75e8855facbd429880a3132f37f626bf2a870c6ca459c

    • C:\Users\Admin\AppData\Local\Temp\vbc10F2.tmp

      Filesize

      660B

      MD5

      dc18cf85aa1577b8df27e912b718ddec

      SHA1

      db94b6c9e511cbca452c36b3464562ea4f782141

      SHA256

      02122c66b8a2df54e525d37dbfa2a3948d6ca6aea8ea7c901d9f95f826ccc56e

      SHA512

      b5654ade04cede63764eb8276113d79d93ec461da754a71f5341e4acf6f275a12c074ffdd9f5d948a57acbc611dc27e85603ebc121357955e3a31b16267c3a8a

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      484967ab9def8ff17dd55476ca137721

      SHA1

      a84012f673fe1ac9041e7827cc3de4b20a1194e2

      SHA256

      9c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b

      SHA512

      1e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7

    • memory/2520-23-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2520-24-0x00000000006E0000-0x0000000000720000-memory.dmp

      Filesize

      256KB

    • memory/2520-25-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2520-26-0x00000000006E0000-0x0000000000720000-memory.dmp

      Filesize

      256KB

    • memory/2520-27-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2520-28-0x00000000006E0000-0x0000000000720000-memory.dmp

      Filesize

      256KB

    • memory/2964-2-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2964-0-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2964-1-0x00000000000F0000-0x0000000000130000-memory.dmp

      Filesize

      256KB

    • memory/2964-22-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB