Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
6742d12ccd2243002f975210f9e16f30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6742d12ccd2243002f975210f9e16f30N.exe
Resource
win10v2004-20240709-en
General
-
Target
6742d12ccd2243002f975210f9e16f30N.exe
-
Size
78KB
-
MD5
6742d12ccd2243002f975210f9e16f30
-
SHA1
15bd6edb54bd2582f622da4b6c922bf517a772c4
-
SHA256
6a1f0457ec907801ab79abcb70c7b1725afa9a000d7995b6d83d13154691a7dc
-
SHA512
23916ca5f8533f9cce0018841c94119451f1ca62eee6589c6923c8e36f8fbcd0f469fcd40f23a8eaac5824ee72b94b508fe418624df0f8d683ede78773f8e46f
-
SSDEEP
1536:IRWV5jEdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC609/nJ1Op:IRWV5jzn7N041Qqhgs9/nG
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp15F1.tmp.exepid process 2712 tmp15F1.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
6742d12ccd2243002f975210f9e16f30N.exepid process 1948 6742d12ccd2243002f975210f9e16f30N.exe 1948 6742d12ccd2243002f975210f9e16f30N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp15F1.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp15F1.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6742d12ccd2243002f975210f9e16f30N.exetmp15F1.tmp.exedescription pid process Token: SeDebugPrivilege 1948 6742d12ccd2243002f975210f9e16f30N.exe Token: SeDebugPrivilege 2712 tmp15F1.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6742d12ccd2243002f975210f9e16f30N.exevbc.exedescription pid process target process PID 1948 wrote to memory of 2260 1948 6742d12ccd2243002f975210f9e16f30N.exe vbc.exe PID 1948 wrote to memory of 2260 1948 6742d12ccd2243002f975210f9e16f30N.exe vbc.exe PID 1948 wrote to memory of 2260 1948 6742d12ccd2243002f975210f9e16f30N.exe vbc.exe PID 1948 wrote to memory of 2260 1948 6742d12ccd2243002f975210f9e16f30N.exe vbc.exe PID 2260 wrote to memory of 1908 2260 vbc.exe cvtres.exe PID 2260 wrote to memory of 1908 2260 vbc.exe cvtres.exe PID 2260 wrote to memory of 1908 2260 vbc.exe cvtres.exe PID 2260 wrote to memory of 1908 2260 vbc.exe cvtres.exe PID 1948 wrote to memory of 2712 1948 6742d12ccd2243002f975210f9e16f30N.exe tmp15F1.tmp.exe PID 1948 wrote to memory of 2712 1948 6742d12ccd2243002f975210f9e16f30N.exe tmp15F1.tmp.exe PID 1948 wrote to memory of 2712 1948 6742d12ccd2243002f975210f9e16f30N.exe tmp15F1.tmp.exe PID 1948 wrote to memory of 2712 1948 6742d12ccd2243002f975210f9e16f30N.exe tmp15F1.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe"C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yrcqamvj.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1A07.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc19F6.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6742d12ccd2243002f975210f9e16f30N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES1A07.tmpFilesize
1KB
MD5cc0374be6624d2a6c85e9701c2b2ccd2
SHA191b04d5918c647e32091626340db08ecbdcbd705
SHA25633cd3cf68415accb49139d4ec732d7694ff488e139731cea011b224ffff04222
SHA512a7351af7256bf4d2c26edddc6c5342c38e75f52862ff4377eef016b8e238a580ce3ce15bf001ad3c76d52e3d147959fcdc363cde4f27fa7e712279c4f0df4006
-
C:\Users\Admin\AppData\Local\Temp\tmp15F1.tmp.exeFilesize
78KB
MD526b568e33f9c35acc0a34166c023a184
SHA11397f59269febdd6fa02582a5764d3a95cb80a59
SHA256e6b8c30759f7ede87b4c7f747b78a8e2680bdbe67440ecf77d60edd295a3ee0b
SHA51208ae405a580bf9219802bae97e7706c3b9d6741a44f5d33ede74c3a96249ee17500b4c3152e8253feb164dc35e1321b513c57c1668080d4acec71600075dd34f
-
C:\Users\Admin\AppData\Local\Temp\vbc19F6.tmpFilesize
660B
MD566c92720beee6c9a918e1be9786b50c9
SHA151b280b92d4139a49ef74744f39578cb749f2e7f
SHA25651ef340657f0e9e6d8769a729bf40391d8b3cb3ce3a71fd4252ee55cee2af7b8
SHA5122376b0a19c6879d18959b37e127b07627f387a9455f06a78598bf7a3fa24f11d0876a497b267a6ce178483e5166d6c46a8d1003caf6d62ba3d192d5a0807c76b
-
C:\Users\Admin\AppData\Local\Temp\yrcqamvj.0.vbFilesize
14KB
MD5acecc6acc5abc68499bf7871b1d706d8
SHA110e56e95f17c968ad3ab8de2c37c339d4065854b
SHA2565e25aa622fb2adfa3cb1c855af9620ba7852774dac24163f648b43c37091e97f
SHA5127454241e3e02b70df7eae9a279e568619d4af37a7524cb27e42f15869a95af443c7bc87b20a1b4d9378afcf6228db239d65bc2725a55d168047fe6a79c86d2c4
-
C:\Users\Admin\AppData\Local\Temp\yrcqamvj.cmdlineFilesize
266B
MD57f86c6c53aecb07a54126369bf7f480b
SHA12a85255faf46f2ea57bf7bd6417291b85594d696
SHA25659e963a4376d6a5ed4162c7d04149af591990b28362d418fc8df01faed81f7bd
SHA512f3c76bee86f5158b72cfda7d759a98ddbb64425c1f27036854f7c40dce610a39b4020f5759ee5190cc950a3ad88046cd76e981245b8d3fe30a7be2d5016dc944
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
memory/1948-0-0x0000000074BF1000-0x0000000074BF2000-memory.dmpFilesize
4KB
-
memory/1948-1-0x0000000074BF0000-0x000000007519B000-memory.dmpFilesize
5.7MB
-
memory/1948-2-0x0000000074BF0000-0x000000007519B000-memory.dmpFilesize
5.7MB
-
memory/1948-24-0x0000000074BF0000-0x000000007519B000-memory.dmpFilesize
5.7MB
-
memory/2260-8-0x0000000074BF0000-0x000000007519B000-memory.dmpFilesize
5.7MB
-
memory/2260-18-0x0000000074BF0000-0x000000007519B000-memory.dmpFilesize
5.7MB