Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 05:44

General

  • Target

    f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe

  • Size

    78KB

  • MD5

    a040738ca16e09217cdbccaaee279c61

  • SHA1

    0327bd267f086570e10bd06b03f4baa58f2bca43

  • SHA256

    f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1

  • SHA512

    ecce9a2ff78c6bd3b91ca619f95ed0683f66fee726139bf9a5da7eb8e3cf09f49e0b71824982ac8807c248d56a80e3a23553a8807a74fe6ad5c4446c840cf6a1

  • SSDEEP

    1536:cPWtHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtm9/Sf12M:cPWtHY53Ln7N041Qqhgm9/Sp

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe
    "C:\Users\Admin\AppData\Local\Temp\f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r_ujezu6.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1C19.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1C09.tmp"
        3⤵
          PID:2680
      • C:\Users\Admin\AppData\Local\Temp\tmp1B2E.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp1B2E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f8bc9137a90852754ea58eaae7211a9e694040118b185a1f4ccaa042b299fdb1.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES1C19.tmp

      Filesize

      1KB

      MD5

      1d3b66d6405a2d7df9885b244ad4beb3

      SHA1

      d76ae1ad9724aa7b9adbf273dbb4eb555dd0b8fc

      SHA256

      9453af2d4c407f6abe83894df0bba0fafcea4b21a9f37d78d22e3877b53d4dca

      SHA512

      cdecb00c9a6b58a2f99dafff0134819895f8943005c905fad5f16c0f023ed8d6d75520c44b4349596fc1cef465087eda4317e6840d5c647086df4a43c8accac9

    • C:\Users\Admin\AppData\Local\Temp\r_ujezu6.0.vb

      Filesize

      15KB

      MD5

      7851a4a51e24af899fb8238d975d7828

      SHA1

      1561a5e8f003969a01f1d072e414d1fcde5e6b22

      SHA256

      eb9247c18b68ec4bd91374b812713ebb9b48cb9e593d4ac38e7c71d5992766ce

      SHA512

      f5fb499f3fd50b84a41ee866ef879e04457ec6757754842fc46f0c18c6d6f97d82dcc7bf48973e8367e8025e4f5413ce425a21e3869a6c77e8253f4d3985a1ff

    • C:\Users\Admin\AppData\Local\Temp\r_ujezu6.cmdline

      Filesize

      266B

      MD5

      9582cfb9921422195f24d749055f7722

      SHA1

      2da3ed409c17f579638c244d9e0b9a24e6b4cfd9

      SHA256

      5fdfdc107cacaefe7c72cba8a70fc13c5c9de715e181ebe0c2a862a10ee408f8

      SHA512

      1f13a06872ab242dbe604ed3adce339a53eeecbe2d44be1a40fd9ee772cbf4c6e436f405601d40cd7a62878274f32b7a13576e661375d0dcec7ae505c7ac5c1e

    • C:\Users\Admin\AppData\Local\Temp\tmp1B2E.tmp.exe

      Filesize

      78KB

      MD5

      e7972a2744b632b08f4875ad6b5a1c83

      SHA1

      26e70987e5ff40711e9db78240a1519f4ea7dfaa

      SHA256

      84012e72cbdb6e198a68b3f3a42ab3d30450c5a7d4ca95b9a1d9fd257e453704

      SHA512

      11010119f329100b9ec03b66b775269d88bee092d544b35b6026ede922440e963a4b0c9b21b2a8dbf375d4d9d73757439432ae17f4e65b84a5fc1963ee514ebf

    • C:\Users\Admin\AppData\Local\Temp\vbc1C09.tmp

      Filesize

      660B

      MD5

      b088f75a3a1201aab8319f5511704b83

      SHA1

      d99925dcb68f6260a9c65264ee48de26ac8590f9

      SHA256

      c4d52a01035e68c242c628be7424e3b45520ba0a7b557c4405062320e90c29fb

      SHA512

      7dc836ddbe95ff0ec85e2fd8aa460889544dfdc12240201021603e648ac4b1c6b098b2b6d9ae844686971499fc93ed38244fc2e1fe4dbc917ce120be0631cb4b

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      aa4bdac8c4e0538ec2bb4b7574c94192

      SHA1

      ef76d834232b67b27ebd75708922adea97aeacce

      SHA256

      d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

      SHA512

      0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

    • memory/1704-0-0x0000000074571000-0x0000000074572000-memory.dmp

      Filesize

      4KB

    • memory/1704-1-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/1704-2-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/1704-24-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2916-9-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2916-18-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB