Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
56fda1a225279bc1a477cd3f82fd34a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
56fda1a225279bc1a477cd3f82fd34a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
56fda1a225279bc1a477cd3f82fd34a0N.exe
-
Size
78KB
-
MD5
56fda1a225279bc1a477cd3f82fd34a0
-
SHA1
c9a62f04247fad125ed89e95e7c452ba0a75ebdf
-
SHA256
662ae2b794e8775927d6f8af0d7df19514dd2e3958db545dd048f2b79d4dda6d
-
SHA512
ac053631dd1808072071ad0d9975ad3fe738550a266517d1d07c32171b0143881ce3b830434c82abf75ca7a1bd8143d05bd89ebd3e31e30c7d4e569331b368f2
-
SSDEEP
1536:YuHY6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQteh9/XyJ1sA:YuHYnhASyRxvhTzXPvCbW2Ueh9/XyV
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp9C01.tmp.exepid process 2860 tmp9C01.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
56fda1a225279bc1a477cd3f82fd34a0N.exepid process 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp9C01.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp9C01.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
56fda1a225279bc1a477cd3f82fd34a0N.exetmp9C01.tmp.exedescription pid process Token: SeDebugPrivilege 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe Token: SeDebugPrivilege 2860 tmp9C01.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
56fda1a225279bc1a477cd3f82fd34a0N.exevbc.exedescription pid process target process PID 2180 wrote to memory of 2496 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe vbc.exe PID 2180 wrote to memory of 2496 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe vbc.exe PID 2180 wrote to memory of 2496 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe vbc.exe PID 2180 wrote to memory of 2496 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe vbc.exe PID 2496 wrote to memory of 3008 2496 vbc.exe cvtres.exe PID 2496 wrote to memory of 3008 2496 vbc.exe cvtres.exe PID 2496 wrote to memory of 3008 2496 vbc.exe cvtres.exe PID 2496 wrote to memory of 3008 2496 vbc.exe cvtres.exe PID 2180 wrote to memory of 2860 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe tmp9C01.tmp.exe PID 2180 wrote to memory of 2860 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe tmp9C01.tmp.exe PID 2180 wrote to memory of 2860 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe tmp9C01.tmp.exe PID 2180 wrote to memory of 2860 2180 56fda1a225279bc1a477cd3f82fd34a0N.exe tmp9C01.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56fda1a225279bc1a477cd3f82fd34a0N.exe"C:\Users\Admin\AppData\Local\Temp\56fda1a225279bc1a477cd3f82fd34a0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2wwl0clx.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9D98.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9D87.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp9C01.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9C01.tmp.exe" C:\Users\Admin\AppData\Local\Temp\56fda1a225279bc1a477cd3f82fd34a0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2wwl0clx.0.vbFilesize
15KB
MD5d243e73a90102ec91eb37ce01f3067d5
SHA10bae02e6b06484dbc05747b7da97fd73135942cf
SHA25611bb501db250ec8fdc6e401039ae8183bc00c335bab0affe86d952d7f18a8fca
SHA512b7e9c2671e367454e7781070a60567b1fcd4360fd264e72c0139a847c753463f47c2cd8725e4e3e182690b9b58e124e480ea02279f75012de6c476d44be8ae18
-
C:\Users\Admin\AppData\Local\Temp\2wwl0clx.cmdlineFilesize
266B
MD5831484d493db3a3858c58465458c75d3
SHA1d79b7bada2537ad14e3eb97e23987f2cbd28581d
SHA2566061dbd90babb165baaff7f75ecfd00391138dddb4fb763836603721d8d7c51a
SHA512228723683b504eff2c31dfcccc76e4b103b84856fda85a4dc262d493d31a4d199c0333f8963d7b2d78c52e81aee8df8a69fcae8916a63432898db87ad5d79261
-
C:\Users\Admin\AppData\Local\Temp\RES9D98.tmpFilesize
1KB
MD5eecd4a509af43bdf12f1dded1acb23a1
SHA1b018bee0d1af1ff85bbaf375f1ff71e656a8f230
SHA256bdeb4cdcbdd7ae4d47074996481f6f743341b3a11c5d053758561a7a37bdc958
SHA5128e6c71f307f63dfd16e71c818bcb4c5bfd3afd533bc15740e6ac40e60d2f84b75af53dc071c17f8a92dc0212ae3bc9397ce7bde1e0fb8e6456a5c3858c7ac407
-
C:\Users\Admin\AppData\Local\Temp\tmp9C01.tmp.exeFilesize
78KB
MD5948910d9b4ab2f0816a5c8643f9ed5e1
SHA1ebf10c8ee97e1acfb7c02a52709d0727d0a170b1
SHA256afbaa29d80627c88ecc0aeaa24223b851546245958d65947e9e9dc40d063f124
SHA512f0e5e1e42e6b20ec34fd886264c18c478093d12d616add8d4b74554d20d9a0b80fbb85565d6d3e952cbe685b0e14df4683b4443d55d55da449deec0785fb29e2
-
C:\Users\Admin\AppData\Local\Temp\vbc9D87.tmpFilesize
660B
MD59bd54e5929e6a092c96baccae22c2588
SHA1ec0e8a3eb472b2d964e01d4cb02bdbfd97ed3896
SHA25645f3b0f72c29d06b8bad3935ae4db1acbad0c5272ca736601eec203691c8e849
SHA5129b2686a91437428eb0058c46d024ec89f514be8fc23b7f36dc62c73b93d7d3b2edd0daa8d6034b8c479c57ad4f4d12daa097f450fef309d4e387f5c67f53ca28
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/2180-0-0x0000000074161000-0x0000000074162000-memory.dmpFilesize
4KB
-
memory/2180-1-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/2180-2-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/2180-24-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/2496-8-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/2496-18-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB