Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 04:38

General

  • Target

    6742d12ccd2243002f975210f9e16f30N.exe

  • Size

    78KB

  • MD5

    6742d12ccd2243002f975210f9e16f30

  • SHA1

    15bd6edb54bd2582f622da4b6c922bf517a772c4

  • SHA256

    6a1f0457ec907801ab79abcb70c7b1725afa9a000d7995b6d83d13154691a7dc

  • SHA512

    23916ca5f8533f9cce0018841c94119451f1ca62eee6589c6923c8e36f8fbcd0f469fcd40f23a8eaac5824ee72b94b508fe418624df0f8d683ede78773f8e46f

  • SSDEEP

    1536:IRWV5jEdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC609/nJ1Op:IRWV5jzn7N041Qqhgs9/nG

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe
    "C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yrcqamvj.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1A07.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc19F6.tmp"
        3⤵
          PID:1908
      • C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2712

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scripting

    1
    T1064

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES1A07.tmp
      Filesize

      1KB

      MD5

      cc0374be6624d2a6c85e9701c2b2ccd2

      SHA1

      91b04d5918c647e32091626340db08ecbdcbd705

      SHA256

      33cd3cf68415accb49139d4ec732d7694ff488e139731cea011b224ffff04222

      SHA512

      a7351af7256bf4d2c26edddc6c5342c38e75f52862ff4377eef016b8e238a580ce3ce15bf001ad3c76d52e3d147959fcdc363cde4f27fa7e712279c4f0df4006

    • C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe
      Filesize

      78KB

      MD5

      26b568e33f9c35acc0a34166c023a184

      SHA1

      1397f59269febdd6fa02582a5764d3a95cb80a59

      SHA256

      e6b8c30759f7ede87b4c7f747b78a8e2680bdbe67440ecf77d60edd295a3ee0b

      SHA512

      08ae405a580bf9219802bae97e7706c3b9d6741a44f5d33ede74c3a96249ee17500b4c3152e8253feb164dc35e1321b513c57c1668080d4acec71600075dd34f

    • C:\Users\Admin\AppData\Local\Temp\vbc19F6.tmp
      Filesize

      660B

      MD5

      66c92720beee6c9a918e1be9786b50c9

      SHA1

      51b280b92d4139a49ef74744f39578cb749f2e7f

      SHA256

      51ef340657f0e9e6d8769a729bf40391d8b3cb3ce3a71fd4252ee55cee2af7b8

      SHA512

      2376b0a19c6879d18959b37e127b07627f387a9455f06a78598bf7a3fa24f11d0876a497b267a6ce178483e5166d6c46a8d1003caf6d62ba3d192d5a0807c76b

    • C:\Users\Admin\AppData\Local\Temp\yrcqamvj.0.vb
      Filesize

      14KB

      MD5

      acecc6acc5abc68499bf7871b1d706d8

      SHA1

      10e56e95f17c968ad3ab8de2c37c339d4065854b

      SHA256

      5e25aa622fb2adfa3cb1c855af9620ba7852774dac24163f648b43c37091e97f

      SHA512

      7454241e3e02b70df7eae9a279e568619d4af37a7524cb27e42f15869a95af443c7bc87b20a1b4d9378afcf6228db239d65bc2725a55d168047fe6a79c86d2c4

    • C:\Users\Admin\AppData\Local\Temp\yrcqamvj.cmdline
      Filesize

      266B

      MD5

      7f86c6c53aecb07a54126369bf7f480b

      SHA1

      2a85255faf46f2ea57bf7bd6417291b85594d696

      SHA256

      59e963a4376d6a5ed4162c7d04149af591990b28362d418fc8df01faed81f7bd

      SHA512

      f3c76bee86f5158b72cfda7d759a98ddbb64425c1f27036854f7c40dce610a39b4020f5759ee5190cc950a3ad88046cd76e981245b8d3fe30a7be2d5016dc944

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources
      Filesize

      62KB

      MD5

      aa4bdac8c4e0538ec2bb4b7574c94192

      SHA1

      ef76d834232b67b27ebd75708922adea97aeacce

      SHA256

      d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

      SHA512

      0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

    • memory/1948-0-0x0000000074BF1000-0x0000000074BF2000-memory.dmp
      Filesize

      4KB

    • memory/1948-1-0x0000000074BF0000-0x000000007519B000-memory.dmp
      Filesize

      5.7MB

    • memory/1948-2-0x0000000074BF0000-0x000000007519B000-memory.dmp
      Filesize

      5.7MB

    • memory/1948-24-0x0000000074BF0000-0x000000007519B000-memory.dmp
      Filesize

      5.7MB

    • memory/2260-8-0x0000000074BF0000-0x000000007519B000-memory.dmp
      Filesize

      5.7MB

    • memory/2260-18-0x0000000074BF0000-0x000000007519B000-memory.dmp
      Filesize

      5.7MB