Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe
Resource
win10v2004-20240419-en
General
-
Target
f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe
-
Size
78KB
-
MD5
a040738ca16e09217cdbccaaee279c61
-
SHA1
0327bd267f086570e10bd06b03f4baa58f2bca43
-
SHA256
f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1
-
SHA512
ecce9a2ff78c6bd3b91ca619f95ed0683f66fee726139bf9a5da7eb8e3cf09f49e0b71824982ac8807c248d56a80e3a23553a8807a74fe6ad5c4446c840cf6a1
-
SSDEEP
1536:cPWtHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtm9/Sf12M:cPWtHY53Ln7N041Qqhgm9/Sp
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2440 tmp1B2E.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp1B2E.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe Token: SeDebugPrivilege 2440 tmp1B2E.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2916 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 28 PID 1704 wrote to memory of 2916 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 28 PID 1704 wrote to memory of 2916 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 28 PID 1704 wrote to memory of 2916 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 28 PID 2916 wrote to memory of 2680 2916 vbc.exe 30 PID 2916 wrote to memory of 2680 2916 vbc.exe 30 PID 2916 wrote to memory of 2680 2916 vbc.exe 30 PID 2916 wrote to memory of 2680 2916 vbc.exe 30 PID 1704 wrote to memory of 2440 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 31 PID 1704 wrote to memory of 2440 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 31 PID 1704 wrote to memory of 2440 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 31 PID 1704 wrote to memory of 2440 1704 f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe"C:\Users\Admin\AppData\Local\Temp\f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r_ujezu6.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1C19.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1C09.tmp"3⤵PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1B2E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1B2E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51d3b66d6405a2d7df9885b244ad4beb3
SHA1d76ae1ad9724aa7b9adbf273dbb4eb555dd0b8fc
SHA2569453af2d4c407f6abe83894df0bba0fafcea4b21a9f37d78d22e3877b53d4dca
SHA512cdecb00c9a6b58a2f99dafff0134819895f8943005c905fad5f16c0f023ed8d6d75520c44b4349596fc1cef465087eda4317e6840d5c647086df4a43c8accac9
-
Filesize
15KB
MD57851a4a51e24af899fb8238d975d7828
SHA11561a5e8f003969a01f1d072e414d1fcde5e6b22
SHA256eb9247c18b68ec4bd91374b812713ebb9b48cb9e593d4ac38e7c71d5992766ce
SHA512f5fb499f3fd50b84a41ee866ef879e04457ec6757754842fc46f0c18c6d6f97d82dcc7bf48973e8367e8025e4f5413ce425a21e3869a6c77e8253f4d3985a1ff
-
Filesize
266B
MD59582cfb9921422195f24d749055f7722
SHA12da3ed409c17f579638c244d9e0b9a24e6b4cfd9
SHA2565fdfdc107cacaefe7c72cba8a70fc13c5c9de715e181ebe0c2a862a10ee408f8
SHA5121f13a06872ab242dbe604ed3adce339a53eeecbe2d44be1a40fd9ee772cbf4c6e436f405601d40cd7a62878274f32b7a13576e661375d0dcec7ae505c7ac5c1e
-
Filesize
78KB
MD5e7972a2744b632b08f4875ad6b5a1c83
SHA126e70987e5ff40711e9db78240a1519f4ea7dfaa
SHA25684012e72cbdb6e198a68b3f3a42ab3d30450c5a7d4ca95b9a1d9fd257e453704
SHA51211010119f329100b9ec03b66b775269d88bee092d544b35b6026ede922440e963a4b0c9b21b2a8dbf375d4d9d73757439432ae17f4e65b84a5fc1963ee514ebf
-
Filesize
660B
MD5b088f75a3a1201aab8319f5511704b83
SHA1d99925dcb68f6260a9c65264ee48de26ac8590f9
SHA256c4d52a01035e68c242c628be7424e3b45520ba0a7b557c4405062320e90c29fb
SHA5127dc836ddbe95ff0ec85e2fd8aa460889544dfdc12240201021603e648ac4b1c6b098b2b6d9ae844686971499fc93ed38244fc2e1fe4dbc917ce120be0631cb4b
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65