Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
099cef853def114c5177030cdfe69c60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
099cef853def114c5177030cdfe69c60N.exe
Resource
win10v2004-20240709-en
General
-
Target
099cef853def114c5177030cdfe69c60N.exe
-
Size
78KB
-
MD5
099cef853def114c5177030cdfe69c60
-
SHA1
8b42410fb5e14ff02ff975ff7cf53250acdfb16e
-
SHA256
07a77b0fc3132d39ee41ab4dbd1bbbdf15ffe8ebfe576cf914a1ec2132dcdcbe
-
SHA512
0a252b31fe7f3073351fced73d3d7860c1fbbd47479f697237da1477792cf22fa3e7b0fcfcd8e7edb1d9ef8f3a17d461eaa3ce8dbbeba1e4a9ef48234df2b42f
-
SSDEEP
1536:tcPCHFo6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qta9/Vs:2PCHFoI3ZAtWDDILJLovbicqOq3o+nao
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmpF98B.tmp.exepid process 2780 tmpF98B.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
099cef853def114c5177030cdfe69c60N.exepid process 1712 099cef853def114c5177030cdfe69c60N.exe 1712 099cef853def114c5177030cdfe69c60N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpF98B.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpF98B.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
099cef853def114c5177030cdfe69c60N.exetmpF98B.tmp.exedescription pid process Token: SeDebugPrivilege 1712 099cef853def114c5177030cdfe69c60N.exe Token: SeDebugPrivilege 2780 tmpF98B.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
099cef853def114c5177030cdfe69c60N.exevbc.exedescription pid process target process PID 1712 wrote to memory of 1820 1712 099cef853def114c5177030cdfe69c60N.exe vbc.exe PID 1712 wrote to memory of 1820 1712 099cef853def114c5177030cdfe69c60N.exe vbc.exe PID 1712 wrote to memory of 1820 1712 099cef853def114c5177030cdfe69c60N.exe vbc.exe PID 1712 wrote to memory of 1820 1712 099cef853def114c5177030cdfe69c60N.exe vbc.exe PID 1820 wrote to memory of 2664 1820 vbc.exe cvtres.exe PID 1820 wrote to memory of 2664 1820 vbc.exe cvtres.exe PID 1820 wrote to memory of 2664 1820 vbc.exe cvtres.exe PID 1820 wrote to memory of 2664 1820 vbc.exe cvtres.exe PID 1712 wrote to memory of 2780 1712 099cef853def114c5177030cdfe69c60N.exe tmpF98B.tmp.exe PID 1712 wrote to memory of 2780 1712 099cef853def114c5177030cdfe69c60N.exe tmpF98B.tmp.exe PID 1712 wrote to memory of 2780 1712 099cef853def114c5177030cdfe69c60N.exe tmpF98B.tmp.exe PID 1712 wrote to memory of 2780 1712 099cef853def114c5177030cdfe69c60N.exe tmpF98B.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\099cef853def114c5177030cdfe69c60N.exe"C:\Users\Admin\AppData\Local\Temp\099cef853def114c5177030cdfe69c60N.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jhobbybq.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFAE3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFAE2.tmp"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmpF98B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF98B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\099cef853def114c5177030cdfe69c60N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESFAE3.tmpFilesize
1KB
MD5b05b3eb950d57d293826d3bf46244be6
SHA188451f62a2665f58d3c00681adf5b31a127098b8
SHA25601f52b62b3187bfc76946c0ad7beb10d36f1c48e0f9c70e75b50e0cb72b3c904
SHA5121f251ea094980e1b72f4d89b8af65bebcf1c07580f1a70d67f46ab3e46e4a6ca5516222147004368be80327474c559761f5030f70d38695f14d23a648d45894a
-
C:\Users\Admin\AppData\Local\Temp\jhobbybq.0.vbFilesize
15KB
MD533362e1c392c21cf22b1e0b79c783692
SHA10074dcdc090764019899b77a18c33652482c0b5a
SHA256d5e8fefb6d9bc823cceda8c8d8b3e5955b2a89972058fd8a364a981cbbd15c1d
SHA51246f2b3e60f0956dbd6ca001785f5cc2fa6db457a7080c24d160b90d290c0f6d41f2b9b45f0fe7ce8409d06048970d82b7cff82c43bc3534906473cab984a7e18
-
C:\Users\Admin\AppData\Local\Temp\jhobbybq.cmdlineFilesize
266B
MD5128c753c1cd3205a83f7788c877ac3fc
SHA1ec01983880ed803ad90bc5f718040cadf10db63b
SHA256becb592f803eb19450a7689799fe74f8d274541a106682b6aec4a2f9d07e1f3b
SHA512c5d092125bf7f15247dd04d2e916c2ecf4c1cab2ee132e56dce1fdbfaac4c3ab50098c70576e775d453ded7a4f02709f991a162f8f7f084e6fd520216e5b360a
-
C:\Users\Admin\AppData\Local\Temp\tmpF98B.tmp.exeFilesize
78KB
MD54eae4a3c3d6d64af1b16970737aaa8cb
SHA111010d32ce2afe2a5eeb77305943b75cc536b1bd
SHA2563600217e3181924d42ab8f51e8686fc95d00f8a9ec45bc3dd6e59fcfc8714384
SHA512b602248a64bed3fa6dc880676bca7a846b4a3d7b8b272954bba94d99c847685a370ada78d7f21312eb1003a3a7c948a9b96e128dc482487d256c0d53b7035ef8
-
C:\Users\Admin\AppData\Local\Temp\vbcFAE2.tmpFilesize
660B
MD501764201cfefef6dbd61d7d1ecc4ef7f
SHA1b70d3652d2ad2eae7b05b06b9229a059d5d4280a
SHA2564f71cdff8642601c489bb172775faf5aeb1217825df6182ee1228c91448d332b
SHA512fcefc82dbc1ad6f2c8be09a79cbeda124417d1692e93c765a21bb87b5a6e9242a71b657a790fe4f7932f5ff8958344a62b07150c6a61ea4411f6f1a49cc0164a
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/1712-0-0x0000000074951000-0x0000000074952000-memory.dmpFilesize
4KB
-
memory/1712-1-0x0000000074950000-0x0000000074EFB000-memory.dmpFilesize
5.7MB
-
memory/1712-2-0x0000000074950000-0x0000000074EFB000-memory.dmpFilesize
5.7MB
-
memory/1712-24-0x0000000074950000-0x0000000074EFB000-memory.dmpFilesize
5.7MB
-
memory/1820-8-0x0000000074950000-0x0000000074EFB000-memory.dmpFilesize
5.7MB
-
memory/1820-18-0x0000000074950000-0x0000000074EFB000-memory.dmpFilesize
5.7MB