Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe
Resource
win10v2004-20240704-en
General
-
Target
4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe
-
Size
78KB
-
MD5
5efc8431509cb1b94154302dfb455d55
-
SHA1
8a8de6b69303be7e998c3ccc55379825cef2da32
-
SHA256
4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b
-
SHA512
f03ec0616d5768fb9e8929599d6605254d7e6d69865a0a9ee8e6484244674b8388ee8e2a6bbe18d82e65137d4ec48fb2c76a09bb26d6b1085e64256c56745b30
-
SSDEEP
1536:rA5jSxAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtt699/U1zv:85jSxAtWDDILJLovbicqOq3o+nK9/W
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe -
Executes dropped EXE 1 IoCs
Processes:
tmpB7A7.tmp.exepid process 2640 tmpB7A7.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpB7A7.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpB7A7.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exetmpB7A7.tmp.exedescription pid process Token: SeDebugPrivilege 3292 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe Token: SeDebugPrivilege 2640 tmpB7A7.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exevbc.exedescription pid process target process PID 3292 wrote to memory of 3508 3292 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe vbc.exe PID 3292 wrote to memory of 3508 3292 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe vbc.exe PID 3292 wrote to memory of 3508 3292 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe vbc.exe PID 3508 wrote to memory of 3900 3508 vbc.exe cvtres.exe PID 3508 wrote to memory of 3900 3508 vbc.exe cvtres.exe PID 3508 wrote to memory of 3900 3508 vbc.exe cvtres.exe PID 3292 wrote to memory of 2640 3292 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe tmpB7A7.tmp.exe PID 3292 wrote to memory of 2640 3292 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe tmpB7A7.tmp.exe PID 3292 wrote to memory of 2640 3292 4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe tmpB7A7.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe"C:\Users\Admin\AppData\Local\Temp\4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\evti7dyo.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB8C1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1CF5D7F9D14E4253ADE79668C783A51.TMP"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmpB7A7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpB7A7.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESB8C1.tmpFilesize
1KB
MD58cfc7207a9750a06b7f1a9d65e9e7c70
SHA1c973b7c4206d3232b561464739afa9a66dbcf1fc
SHA25672182953ce378a60a30a33c56933263472a31d23259e6fa37d2f5241e85be307
SHA5124251eb6e13d1eacbfe10736f967329b2a06100d06609515465d4772474765986952f5b13adad7d04cd001d6cb32f6a2c945eb41150aa671ca953ba22a55e6ee5
-
C:\Users\Admin\AppData\Local\Temp\evti7dyo.0.vbFilesize
14KB
MD5e4cf6d087d8cb6014c9be2667db21c71
SHA10bde221dd36a1074352bc67609bca7e39c5324d0
SHA256164b7a9ece8c6fa2d5b13344d1199023c15763e555af023b4ff9e2aef8f46e30
SHA5129e575dd158a8441ad4924a2b39d4b54df135984e2f6e595654a00b4de7ec8b9c1978e5a2d3685f492bed8c400c8e27a29f3491231ee3f64261bb6c4ec731ed41
-
C:\Users\Admin\AppData\Local\Temp\evti7dyo.cmdlineFilesize
266B
MD545fc4d2c95e1176f740ada9c371b716a
SHA19826a7ad7cd9cf63ff8951d3ddfd0206edf69143
SHA256a783736f5cd27ab798a86e5bf2d430e7da2c9c3238e4f7e16bb4434846a7ce7d
SHA5122d8b94d18ade7d44b29277c31e848b7d9153405683f087e2663a061bfdedcc290f0f23901af6b57106acf774b555eb075ba9d680ec3b21c8a4a356907ea193b4
-
C:\Users\Admin\AppData\Local\Temp\tmpB7A7.tmp.exeFilesize
78KB
MD5b7ad68801967aff964881b269fd2b6a1
SHA1c145da2aa3a11282a2d129b472b218a58b69747c
SHA256a82573a1d3ccb3fafe39f006e538a5f7932f276632b827339004ee48a277fa4a
SHA5120c3a862c26f82cf9cd0aeaca6407d04f3a7f85cfaec9277948563d235592a8785004f1781b8056140e2a118d7ce180a8bdde8e00a85932b1072110703c6440ac
-
C:\Users\Admin\AppData\Local\Temp\vbc1CF5D7F9D14E4253ADE79668C783A51.TMPFilesize
660B
MD53038600e56b1ce2576e3677e547fa683
SHA1bd23b1bb17620e0360c1136b2aa35b4d78050424
SHA2560bcfbb45d1970423f969e1e39977515415d3879255db0e083db78e0332034eff
SHA51217479428877506034950ac9d7d8909240cb158fd8f6339edb32fa280d1440cd28b45cd62d013989a769fe99b38d6f12ce44d0d3e2e016bb40d9db68a3a618c7f
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/2640-25-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/2640-23-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/2640-24-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/2640-26-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/2640-27-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/2640-28-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/3292-22-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/3292-0-0x00000000749E2000-0x00000000749E3000-memory.dmpFilesize
4KB
-
memory/3292-1-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/3292-2-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/3508-13-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB
-
memory/3508-18-0x00000000749E0000-0x0000000074F91000-memory.dmpFilesize
5.7MB