Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
0002bcc0491b271edc25aff61de80f00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0002bcc0491b271edc25aff61de80f00N.exe
Resource
win10v2004-20240709-en
General
-
Target
0002bcc0491b271edc25aff61de80f00N.exe
-
Size
78KB
-
MD5
0002bcc0491b271edc25aff61de80f00
-
SHA1
d9dcb3ade7946c494f6d41d374b5d994e24d2157
-
SHA256
e487ec7bf8779743f7c733d6fb79c189f9fa84186a9782a2f1576b7a3e484243
-
SHA512
af8e2cb5e2b37165e30d217d7c1c5b0a31d16ed9ee36df6309041ae33e832cee85268fc2f9d25e00c008a6f307d4acdb57e1406a036fb1c30ef2250219ede467
-
SSDEEP
1536:VCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtc9/U1WA:VCHF8hASyRxvhTzXPvCbW2Uc9/e
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0002bcc0491b271edc25aff61de80f00N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 0002bcc0491b271edc25aff61de80f00N.exe -
Executes dropped EXE 1 IoCs
Processes:
tmpAFF7.tmp.exepid process 4924 tmpAFF7.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpAFF7.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpAFF7.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0002bcc0491b271edc25aff61de80f00N.exetmpAFF7.tmp.exedescription pid process Token: SeDebugPrivilege 744 0002bcc0491b271edc25aff61de80f00N.exe Token: SeDebugPrivilege 4924 tmpAFF7.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0002bcc0491b271edc25aff61de80f00N.exevbc.exedescription pid process target process PID 744 wrote to memory of 5028 744 0002bcc0491b271edc25aff61de80f00N.exe vbc.exe PID 744 wrote to memory of 5028 744 0002bcc0491b271edc25aff61de80f00N.exe vbc.exe PID 744 wrote to memory of 5028 744 0002bcc0491b271edc25aff61de80f00N.exe vbc.exe PID 5028 wrote to memory of 2340 5028 vbc.exe cvtres.exe PID 5028 wrote to memory of 2340 5028 vbc.exe cvtres.exe PID 5028 wrote to memory of 2340 5028 vbc.exe cvtres.exe PID 744 wrote to memory of 4924 744 0002bcc0491b271edc25aff61de80f00N.exe tmpAFF7.tmp.exe PID 744 wrote to memory of 4924 744 0002bcc0491b271edc25aff61de80f00N.exe tmpAFF7.tmp.exe PID 744 wrote to memory of 4924 744 0002bcc0491b271edc25aff61de80f00N.exe tmpAFF7.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0002bcc0491b271edc25aff61de80f00N.exe"C:\Users\Admin\AppData\Local\Temp\0002bcc0491b271edc25aff61de80f00N.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jnatxnye.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB1CB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB82D3E0314C4826858B71D84BA576E.TMP"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmpAFF7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAFF7.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0002bcc0491b271edc25aff61de80f00N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESB1CB.tmpFilesize
1KB
MD5e6687c99d663575a61d4e8d7343d17a0
SHA122f108a1aa30b37a58281c7462f76d852495b7b3
SHA25665a923b6e2587c9a13197d6d7f7fa3e762210639e46570e38c0892848daaabff
SHA512bbe299be7d780d1a50f8fa16e6b4208d76508f6e3c50cc1c9c7da678b9092003a5ae1a0542330cac23944eaf890b808e3c0667ac289f4c7a2f089ba3c7599f28
-
C:\Users\Admin\AppData\Local\Temp\jnatxnye.0.vbFilesize
15KB
MD569945620ea1e15557ebb0778e108ea63
SHA136b8d9ffc5eab17ca0a3fd871886d1decf0c7a41
SHA2566869fa6efcc4435dd74a0e82ba6c78a83e4ca25a94866394bfaa39b1fd0aa694
SHA512661590ed792ef7e9288eb645d58ea4dea059df89ac1d61cd702cd09490ef868a0e170c4be28a686c90a5fc22a8f8bb6bb6c954022de6e032df065a84ae742fb1
-
C:\Users\Admin\AppData\Local\Temp\jnatxnye.cmdlineFilesize
266B
MD5cc0d94264e27f5094dd67c4632512fed
SHA1a488f85222e864e7fd76eccb6981af6401a7a5f6
SHA256970876d5bc12520663e1de7e0c8cba8e08348e752b8471ff09f9e7552e0f5ebd
SHA51202db3ff41385cb7e745067f3accb38a3ee7763adce09a91476e61737b6e5cedbdc1a23bc92e7e9138a65df388b95f1267e25e2fe91cc515f0001536e8bbc16e5
-
C:\Users\Admin\AppData\Local\Temp\tmpAFF7.tmp.exeFilesize
78KB
MD55e6dbd2279c5bf4c61ff86a6a51e174a
SHA18aa30a1ab47d328cc07acfc08f24c8e0d82474c7
SHA2569c826dcce1367aad0f268c9352a62892898531544106053b711c8c6b0cfee4bb
SHA512301f22bac294c85812d99992ffbb66e0aa6a6436fefce8b61b64ec5e1b38a707a13d34714a1d8a4666c20eeee9343292aade897eb6bc460904f2bfb5200f81a5
-
C:\Users\Admin\AppData\Local\Temp\vbcFB82D3E0314C4826858B71D84BA576E.TMPFilesize
660B
MD5e8ebb6656dd1155314dfeb21f1f2da6a
SHA1e6efc86a051b1e9d03febfa6bfcd1ab3af58c60a
SHA2561bf7141b67e993deb2101421dc3bfe8bbfc785f953871b81813df3095e8b0bf6
SHA5121912a627e5c05ab4f3fa9767c1aad9c44211cde7d4dbcb28c502f383f63824e9a859f0cc35aed182ab198e68ed6b9654719a28eaf38d5bd1d4a87accad6ad455
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/744-1-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/744-2-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/744-0-0x0000000074C02000-0x0000000074C03000-memory.dmpFilesize
4KB
-
memory/744-22-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/4924-25-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/4924-23-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/4924-24-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/4924-27-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/4924-28-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/4924-29-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/5028-9-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB
-
memory/5028-18-0x0000000074C00000-0x00000000751B1000-memory.dmpFilesize
5.7MB