Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe
Resource
win10v2004-20240419-en
General
-
Target
e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe
-
Size
78KB
-
MD5
a2d86a5d190b79d2466f4cbe601b4742
-
SHA1
b3a59344e7e847b2a5cd7ac6df750bf2c792b0b2
-
SHA256
e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6
-
SHA512
97c842c825034b64bc2a3524672f7438a6192a225aa5cd483d892061494a02c68cba13f91f4af48d8ad82724b9f49c9f635c42a9758b35c5dc0c3807cfcba6f1
-
SSDEEP
1536:5e58Gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC689/t1Jx:5e58xn7N041Qqhg09//
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe -
Executes dropped EXE 1 IoCs
pid Process 4060 tmp4BCE.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp4BCE.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 180 e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe Token: SeDebugPrivilege 4060 tmp4BCE.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 180 wrote to memory of 4876 180 e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe 85 PID 180 wrote to memory of 4876 180 e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe 85 PID 180 wrote to memory of 4876 180 e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe 85 PID 4876 wrote to memory of 1484 4876 vbc.exe 88 PID 4876 wrote to memory of 1484 4876 vbc.exe 88 PID 4876 wrote to memory of 1484 4876 vbc.exe 88 PID 180 wrote to memory of 4060 180 e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe 89 PID 180 wrote to memory of 4060 180 e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe 89 PID 180 wrote to memory of 4060 180 e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe"C:\Users\Admin\AppData\Local\Temp\e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bz3aaj25.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4DC2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc25831E5DDFD3442A91DEBA3FBBC0727.TMP"3⤵PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4BCE.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4BCE.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e5f5674965e6c00dc2cacf1bfcad2641bc868ceb0d9511d051d910368c42f1e6.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59dda4756fdca8f3cce58132b9cadfbb9
SHA1a5392ecafc68e299c668e6d4e01460a65903f32d
SHA256731a96054d4f58f62bebc92bb612a3407352ca4a487e0bc4fa535c73be2b4dcb
SHA512aab3e591097718037381885c66af3b9ddf14e886a2c003582acf66e1d124a02c2dd3eb2e713d0ae7debacf87fb1aad9d7e2689afbf7954fe58af1847714d3930
-
Filesize
14KB
MD502d97a695c14eb414cdb1ff582c491f3
SHA11ab3fe6eb68f611064caff17ddaaa2ef266bbb1f
SHA2564c8307de38ce7fdbb88a807ca284c892100803f8409324a889857a936ea6827b
SHA51211058927faac03581cabdc105321954ae54a71b9b4a2b76905235a4aa6adbb20710256c77bea48a4f4fbd5e74efe2521a054150bf5cc5f8d468b1e0a8a824d46
-
Filesize
266B
MD50e2758f4c1641b3dd2a5c2f99e2d3268
SHA1a34ccf282d8fc39d72da033a3e78ef0ab562716f
SHA2562c31516a83f1f9bbaa5c4274f4e4b75a719ede5041196d909f49fc3dd60e9f01
SHA512c962feeccd514667d96a52b3921af8badf450b55021c585681cea8e0cad9e01d0ae907b73d50b11860dd84efc2febf3f7d938a70487d3e3b3f6307f0aa840569
-
Filesize
78KB
MD58eb333bb08518ffe7e0bca3903b0792a
SHA14aa552b0b32909a384f59dffc191370b94451d1f
SHA256e59dd6224439b0cf324333232b41ddf1c286a336b9b1f5ae55189e8bbca524cf
SHA512346c9738376beb67bedff81d36ab01fb299fa6747e9f115e8b844ed397c1195de950372eaaa1c1b226d020f35d57a1aaa3847ad89430cd454786fc534745e7a1
-
Filesize
660B
MD51c8fcdc7a58b63b5d71e9cb25f1a20f5
SHA1d9365ddb8736fe74533850fb56aeaac01f6a6ad2
SHA25639ac198ccd9135e1fecdba8c333a1020e496913f9937b6b30132e3fdeb598fac
SHA512699879c3fc2083a1762de583be830fef194e6e9f10bab50fc6348c91419915dab8fb8bd41e670fee6b106abb89ca70b2ac2c4e055604745197592ef0f0802bc7
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65