Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
4055902531fb7712981860ed1279b730N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4055902531fb7712981860ed1279b730N.exe
Resource
win10v2004-20240709-en
General
-
Target
4055902531fb7712981860ed1279b730N.exe
-
Size
78KB
-
MD5
4055902531fb7712981860ed1279b730
-
SHA1
f900ddadbcb024f2c285d18d3eb88e1553967b42
-
SHA256
384e3970d7a4d9a1644f47ba61bef95a6687a3d9c2345aa52899c3ac9d556959
-
SHA512
fa73bc74ed256b7fd7fce0eb9ce20b6c38de7920c202720d6ab3c7e354cf33c4c9d81ad6187a095689703763e0468d9294a83883d5166ced743d8698cb591222
-
SSDEEP
1536:1e58cdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC64w9/a/k1+Q:1e58rn7N041Qqhggw9/ay
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmpC66B.tmp.exepid process 1588 tmpC66B.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
4055902531fb7712981860ed1279b730N.exepid process 3064 4055902531fb7712981860ed1279b730N.exe 3064 4055902531fb7712981860ed1279b730N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpC66B.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpC66B.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4055902531fb7712981860ed1279b730N.exetmpC66B.tmp.exedescription pid process Token: SeDebugPrivilege 3064 4055902531fb7712981860ed1279b730N.exe Token: SeDebugPrivilege 1588 tmpC66B.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4055902531fb7712981860ed1279b730N.exevbc.exedescription pid process target process PID 3064 wrote to memory of 2304 3064 4055902531fb7712981860ed1279b730N.exe vbc.exe PID 3064 wrote to memory of 2304 3064 4055902531fb7712981860ed1279b730N.exe vbc.exe PID 3064 wrote to memory of 2304 3064 4055902531fb7712981860ed1279b730N.exe vbc.exe PID 3064 wrote to memory of 2304 3064 4055902531fb7712981860ed1279b730N.exe vbc.exe PID 2304 wrote to memory of 1284 2304 vbc.exe cvtres.exe PID 2304 wrote to memory of 1284 2304 vbc.exe cvtres.exe PID 2304 wrote to memory of 1284 2304 vbc.exe cvtres.exe PID 2304 wrote to memory of 1284 2304 vbc.exe cvtres.exe PID 3064 wrote to memory of 1588 3064 4055902531fb7712981860ed1279b730N.exe tmpC66B.tmp.exe PID 3064 wrote to memory of 1588 3064 4055902531fb7712981860ed1279b730N.exe tmpC66B.tmp.exe PID 3064 wrote to memory of 1588 3064 4055902531fb7712981860ed1279b730N.exe tmpC66B.tmp.exe PID 3064 wrote to memory of 1588 3064 4055902531fb7712981860ed1279b730N.exe tmpC66B.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4055902531fb7712981860ed1279b730N.exe"C:\Users\Admin\AppData\Local\Temp\4055902531fb7712981860ed1279b730N.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\h7axlf21.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC7D2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC7D1.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmpC66B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpC66B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4055902531fb7712981860ed1279b730N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESC7D2.tmpFilesize
1KB
MD558795e5264392e16d11ed63637615326
SHA1c0b34c910eb837fe38fff4644b61b25ba7d15a08
SHA256100238945829f7202151e952fb202da8b8cf72e3ddf1da9fb61767a4af25cec5
SHA5120f7ab653d3682b7e1655973d7f874485e144b53b97b5e79924120c31251d166c65b3ffbf580eba6d8a45719b140e7ad2f7c3ef1a8ef9669921bcbaa988f3411a
-
C:\Users\Admin\AppData\Local\Temp\h7axlf21.0.vbFilesize
14KB
MD5599ec997ac2d176ca8af0ef2f101c6df
SHA176cbf8c5333a15d49168613277ee8b329b670248
SHA2569ac14b31d369ea0d5b71cd895f17fe8ead017e18e9bc301e3ab4648b8d4c5c6f
SHA512f87f2c0536a34c7fb2f92f384909010164117f7839531560cc9b9ce97e1de71cfe9364b20d734697cd9a49aadcdac2e6adf7fa6a2dc0b6846fae03fc2539634d
-
C:\Users\Admin\AppData\Local\Temp\h7axlf21.cmdlineFilesize
266B
MD509a84233097010ef918366f2f0b96874
SHA15e892a621115c541126d1a7f02b1dac3f43d4d66
SHA256486fcc2d21ca2c81154807badf0437c06493bce76db2e1ed50845d44efd23e8f
SHA5125586c851f941faf8283f4c866a3e4d6166aeb496e5a0ac2ce2a3ef9fa700ad0db9db212fa34dee65be5f2c11a99e8b1b6e3e589bcc1b27d189274aa34ee6f66a
-
C:\Users\Admin\AppData\Local\Temp\tmpC66B.tmp.exeFilesize
78KB
MD58f1f272e8165e86222de5c38beeeb8c7
SHA145b662042dbc71b2be8d2773e7cc3148b457188f
SHA2560075da70be44d3d1479919c35f4d517ac78beaa98592d6c72a854575ace68392
SHA5121a00902cc54b6fab08b750d84aa2e3e8ff940c55fc9a21d3fd7f6b7ba378aca1a3893640bbb245e6452f34c1ed779b6ca2c0989c5ff2c99f80f221cd4134c077
-
C:\Users\Admin\AppData\Local\Temp\vbcC7D1.tmpFilesize
660B
MD5a88622bccea08eb5d33d6e216639fffe
SHA146ab66f77fc57762c555c4a43939ce2f93013ed5
SHA2561641b786bc199f171b648c028bf562898d83e90f2f6f24ae3e36d9ba36939e9d
SHA5127a674f4da3bca0f7747eb96b4afaf360fcec6080abc3f18bf782b3e0a7f92c328ca41b577fb0e9e1d1741f5becd3bcd3da08eb3d7f5a07c81b5a0fe3bdea4913
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
memory/2304-8-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB
-
memory/2304-18-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB
-
memory/3064-0-0x0000000074821000-0x0000000074822000-memory.dmpFilesize
4KB
-
memory/3064-1-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB
-
memory/3064-2-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB
-
memory/3064-24-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB