Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
0002bcc0491b271edc25aff61de80f00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0002bcc0491b271edc25aff61de80f00N.exe
Resource
win10v2004-20240709-en
General
-
Target
0002bcc0491b271edc25aff61de80f00N.exe
-
Size
78KB
-
MD5
0002bcc0491b271edc25aff61de80f00
-
SHA1
d9dcb3ade7946c494f6d41d374b5d994e24d2157
-
SHA256
e487ec7bf8779743f7c733d6fb79c189f9fa84186a9782a2f1576b7a3e484243
-
SHA512
af8e2cb5e2b37165e30d217d7c1c5b0a31d16ed9ee36df6309041ae33e832cee85268fc2f9d25e00c008a6f307d4acdb57e1406a036fb1c30ef2250219ede467
-
SSDEEP
1536:VCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtc9/U1WA:VCHF8hASyRxvhTzXPvCbW2Uc9/e
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp1F44.tmp.exepid process 2736 tmp1F44.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
0002bcc0491b271edc25aff61de80f00N.exepid process 1996 0002bcc0491b271edc25aff61de80f00N.exe 1996 0002bcc0491b271edc25aff61de80f00N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp1F44.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp1F44.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0002bcc0491b271edc25aff61de80f00N.exetmp1F44.tmp.exedescription pid process Token: SeDebugPrivilege 1996 0002bcc0491b271edc25aff61de80f00N.exe Token: SeDebugPrivilege 2736 tmp1F44.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0002bcc0491b271edc25aff61de80f00N.exevbc.exedescription pid process target process PID 1996 wrote to memory of 2484 1996 0002bcc0491b271edc25aff61de80f00N.exe vbc.exe PID 1996 wrote to memory of 2484 1996 0002bcc0491b271edc25aff61de80f00N.exe vbc.exe PID 1996 wrote to memory of 2484 1996 0002bcc0491b271edc25aff61de80f00N.exe vbc.exe PID 1996 wrote to memory of 2484 1996 0002bcc0491b271edc25aff61de80f00N.exe vbc.exe PID 2484 wrote to memory of 2216 2484 vbc.exe cvtres.exe PID 2484 wrote to memory of 2216 2484 vbc.exe cvtres.exe PID 2484 wrote to memory of 2216 2484 vbc.exe cvtres.exe PID 2484 wrote to memory of 2216 2484 vbc.exe cvtres.exe PID 1996 wrote to memory of 2736 1996 0002bcc0491b271edc25aff61de80f00N.exe tmp1F44.tmp.exe PID 1996 wrote to memory of 2736 1996 0002bcc0491b271edc25aff61de80f00N.exe tmp1F44.tmp.exe PID 1996 wrote to memory of 2736 1996 0002bcc0491b271edc25aff61de80f00N.exe tmp1F44.tmp.exe PID 1996 wrote to memory of 2736 1996 0002bcc0491b271edc25aff61de80f00N.exe tmp1F44.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0002bcc0491b271edc25aff61de80f00N.exe"C:\Users\Admin\AppData\Local\Temp\0002bcc0491b271edc25aff61de80f00N.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\_girkcpn.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2222.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2221.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp1F44.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1F44.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0002bcc0491b271edc25aff61de80f00N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES2222.tmpFilesize
1KB
MD541e81242535f34b05ea4308492317f20
SHA19a1bbf3d7d1f4965aa1337492f47890e47eea709
SHA256518eac1348510baf219c9c3f786fc6b30e76bb9e142e4283936b2a64bfe357b4
SHA512686f15f8eb4302cb08a440d71889891a0390aa0110ac1694b9acfdcc4b6d572973b5cc71c801ae78c610de8deadcda6b666cc98a360c4628583cfcc7ba2e45fc
-
C:\Users\Admin\AppData\Local\Temp\_girkcpn.0.vbFilesize
15KB
MD5d0f5163def0d4686de6ce2c1a62a5d9e
SHA177e072cb6281d495c1e9c49c81d2226bcb921a81
SHA256e6298be1816407a418e8ebbc7a2da348825f9efa9cd255e8f31ea7f866cbdc5a
SHA51254fc42ae4f7e0d3dff6a2737a8b5683a8d40c8a14dce33d9cfb47aae6cdd1a35f351d171a327396fbd934bf3813ff301cac952cb2bd923e3d33e301bf0ace3b2
-
C:\Users\Admin\AppData\Local\Temp\_girkcpn.cmdlineFilesize
266B
MD5157e5dd65c28870a94273a0606c2767a
SHA1ffb5589dce46f903bd076b01c36bc2955a951d27
SHA256cf318de772047621a26ad710092a915718eb3e6d0b0dc44434c5c1a07cf77de0
SHA51205e66265236e046a2d9af85701fdeffe1f993761940025acbfaf1c4f71f42d6ed9427ed9379cb78c44e5dace23702a5a96b632e3696fa95cd2e475b6049198c7
-
C:\Users\Admin\AppData\Local\Temp\tmp1F44.tmp.exeFilesize
78KB
MD5e50c66277e6d2c4e3f7e2564469f43a6
SHA1132033fd86c467e7da212cc68d6c9d8359cc6e98
SHA256c30f1fe733eed4a32b4830c78d47eb990e0e0f9b72c4ef469026d1497e8d417e
SHA512ac68c729be3ac2973bd637e18010f782ccd7b90696927b8b3800d76460ec43c33803abebb93518155c823cc97fb11a109c7150cee3128dc5a6797ab2dba78fa8
-
C:\Users\Admin\AppData\Local\Temp\vbc2221.tmpFilesize
660B
MD5160009c71f443c319cf2dfc3fa266c6b
SHA1e1467a03914b95a8539d5814719079fa5da67ebf
SHA256e0eabff6a8b2f8b07935621556b629ba8fb91d0f88d196c611fd9850641aaed4
SHA51257330b490a951d2e2d9e2064d2781e88948b8e72d247012cd17a9e6bc5eaa901c382b410aca1a24a3fecc5df47d8947793a19cd5874ddd5e2b0cf84811a5d8b0
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/1996-0-0x00000000749A1000-0x00000000749A2000-memory.dmpFilesize
4KB
-
memory/1996-1-0x00000000749A0000-0x0000000074F4B000-memory.dmpFilesize
5.7MB
-
memory/1996-2-0x00000000749A0000-0x0000000074F4B000-memory.dmpFilesize
5.7MB
-
memory/1996-24-0x00000000749A0000-0x0000000074F4B000-memory.dmpFilesize
5.7MB
-
memory/2484-9-0x00000000749A0000-0x0000000074F4B000-memory.dmpFilesize
5.7MB
-
memory/2484-18-0x00000000749A0000-0x0000000074F4B000-memory.dmpFilesize
5.7MB