Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 20:51

General

  • Target

    4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe

  • Size

    78KB

  • MD5

    5efc8431509cb1b94154302dfb455d55

  • SHA1

    8a8de6b69303be7e998c3ccc55379825cef2da32

  • SHA256

    4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b

  • SHA512

    f03ec0616d5768fb9e8929599d6605254d7e6d69865a0a9ee8e6484244674b8388ee8e2a6bbe18d82e65137d4ec48fb2c76a09bb26d6b1085e64256c56745b30

  • SSDEEP

    1536:rA5jSxAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtt699/U1zv:85jSxAtWDDILJLovbicqOq3o+nK9/W

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe
    "C:\Users\Admin\AppData\Local\Temp\4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\evti7dyo.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB8C1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1CF5D7F9D14E4253ADE79668C783A51.TMP"
        3⤵
          PID:3900
      • C:\Users\Admin\AppData\Local\Temp\tmpB7A7.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpB7A7.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4423a5d188e8b912d85b2093a48493fe3dee0ab949144d155bfb7fda474d263b.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2640

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scripting

    1
    T1064

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESB8C1.tmp
      Filesize

      1KB

      MD5

      8cfc7207a9750a06b7f1a9d65e9e7c70

      SHA1

      c973b7c4206d3232b561464739afa9a66dbcf1fc

      SHA256

      72182953ce378a60a30a33c56933263472a31d23259e6fa37d2f5241e85be307

      SHA512

      4251eb6e13d1eacbfe10736f967329b2a06100d06609515465d4772474765986952f5b13adad7d04cd001d6cb32f6a2c945eb41150aa671ca953ba22a55e6ee5

    • C:\Users\Admin\AppData\Local\Temp\evti7dyo.0.vb
      Filesize

      14KB

      MD5

      e4cf6d087d8cb6014c9be2667db21c71

      SHA1

      0bde221dd36a1074352bc67609bca7e39c5324d0

      SHA256

      164b7a9ece8c6fa2d5b13344d1199023c15763e555af023b4ff9e2aef8f46e30

      SHA512

      9e575dd158a8441ad4924a2b39d4b54df135984e2f6e595654a00b4de7ec8b9c1978e5a2d3685f492bed8c400c8e27a29f3491231ee3f64261bb6c4ec731ed41

    • C:\Users\Admin\AppData\Local\Temp\evti7dyo.cmdline
      Filesize

      266B

      MD5

      45fc4d2c95e1176f740ada9c371b716a

      SHA1

      9826a7ad7cd9cf63ff8951d3ddfd0206edf69143

      SHA256

      a783736f5cd27ab798a86e5bf2d430e7da2c9c3238e4f7e16bb4434846a7ce7d

      SHA512

      2d8b94d18ade7d44b29277c31e848b7d9153405683f087e2663a061bfdedcc290f0f23901af6b57106acf774b555eb075ba9d680ec3b21c8a4a356907ea193b4

    • C:\Users\Admin\AppData\Local\Temp\tmpB7A7.tmp.exe
      Filesize

      78KB

      MD5

      b7ad68801967aff964881b269fd2b6a1

      SHA1

      c145da2aa3a11282a2d129b472b218a58b69747c

      SHA256

      a82573a1d3ccb3fafe39f006e538a5f7932f276632b827339004ee48a277fa4a

      SHA512

      0c3a862c26f82cf9cd0aeaca6407d04f3a7f85cfaec9277948563d235592a8785004f1781b8056140e2a118d7ce180a8bdde8e00a85932b1072110703c6440ac

    • C:\Users\Admin\AppData\Local\Temp\vbc1CF5D7F9D14E4253ADE79668C783A51.TMP
      Filesize

      660B

      MD5

      3038600e56b1ce2576e3677e547fa683

      SHA1

      bd23b1bb17620e0360c1136b2aa35b4d78050424

      SHA256

      0bcfbb45d1970423f969e1e39977515415d3879255db0e083db78e0332034eff

      SHA512

      17479428877506034950ac9d7d8909240cb158fd8f6339edb32fa280d1440cd28b45cd62d013989a769fe99b38d6f12ce44d0d3e2e016bb40d9db68a3a618c7f

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources
      Filesize

      62KB

      MD5

      a26b0f78faa3881bb6307a944b096e91

      SHA1

      42b01830723bf07d14f3086fa83c4f74f5649368

      SHA256

      b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

      SHA512

      a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

    • memory/2640-25-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/2640-23-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/2640-24-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/2640-26-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/2640-27-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/2640-28-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/3292-22-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/3292-0-0x00000000749E2000-0x00000000749E3000-memory.dmp
      Filesize

      4KB

    • memory/3292-1-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/3292-2-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/3508-13-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB

    • memory/3508-18-0x00000000749E0000-0x0000000074F91000-memory.dmp
      Filesize

      5.7MB