Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe
Resource
win10v2004-20240709-en
General
-
Target
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe
-
Size
78KB
-
MD5
426b7f53123e33ecf63f7aa20efc3a06
-
SHA1
aab0f067e2d272bf4944bee7d7fcfc74e4409a74
-
SHA256
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8
-
SHA512
8ca677a8f3efec0dac4603a8b189fe81b98e71d57e3db2d77d12bcebaf13992059430a00c338c5e343a5ef970b9bc95164cceb912cdab18eb36cc8cb8cb97c76
-
SSDEEP
1536:7XPy5jS7AlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti659/Mv13Y:7Py5jS7AtWDDILJLovbicqOq3o+nR9/D
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmpA1AC.tmp.exepid process 2460 tmpA1AC.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exepid process 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpA1AC.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpA1AC.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exevbc.execvtres.exetmpA1AC.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA1AC.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exetmpA1AC.tmp.exedescription pid process Token: SeDebugPrivilege 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe Token: SeDebugPrivilege 2460 tmpA1AC.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exevbc.exedescription pid process target process PID 2408 wrote to memory of 1500 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe vbc.exe PID 2408 wrote to memory of 1500 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe vbc.exe PID 2408 wrote to memory of 1500 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe vbc.exe PID 2408 wrote to memory of 1500 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe vbc.exe PID 1500 wrote to memory of 1956 1500 vbc.exe cvtres.exe PID 1500 wrote to memory of 1956 1500 vbc.exe cvtres.exe PID 1500 wrote to memory of 1956 1500 vbc.exe cvtres.exe PID 1500 wrote to memory of 1956 1500 vbc.exe cvtres.exe PID 2408 wrote to memory of 2460 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe tmpA1AC.tmp.exe PID 2408 wrote to memory of 2460 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe tmpA1AC.tmp.exe PID 2408 wrote to memory of 2460 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe tmpA1AC.tmp.exe PID 2408 wrote to memory of 2460 2408 ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe tmpA1AC.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe"C:\Users\Admin\AppData\Local\Temp\ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qphbdlb1.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA2A6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA2A5.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmpA1AC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA1AC.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ab5b71b3b788605bbd6fa0e0176daed18641f237cccd59b835099fa1b93cefa8.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESA2A6.tmpFilesize
1KB
MD5836a3f1ff70f4413c8be3f2ad71f0377
SHA19f7122b465ca97c45abeb680de16bfff66dc1ddb
SHA256367a6db4c4aa8fe947564a5576be6cc6abfa1d65e775817a5518b4332cddfa61
SHA512ce018b6cf5724e70427b5c65bc93ce5e5e0ecf63257808d9cbe7ba4c16895dc259efc06a7461d5326aeff3af8a222acf9a288650f6b40c09893704e9fac41ba8
-
C:\Users\Admin\AppData\Local\Temp\qphbdlb1.0.vbFilesize
14KB
MD5b00b51c8c9fd21be4e080c08d2bf4727
SHA1486ac0eea8f1f3c6d89fce03e82d4773d5518992
SHA256c5bd3917ebf1437c502b03812f9a75637c86e01cb527c7bf66513dd6fd76ee57
SHA512bcd475e50fe01fde511d736aefdab3f0504f1f8719008dec702e430183f6bbb24eb5b47749bb28e65a6b857c05ebb050d3361c1d4d5e559a005dd88a1063af43
-
C:\Users\Admin\AppData\Local\Temp\qphbdlb1.cmdlineFilesize
266B
MD529e5b543125ddb19db4a803e050bc0ab
SHA10ef2d354ea267f49723601e3f32663cbb274c1c0
SHA256e672d7b662af91056d19dfcea9df05423f9056009457679f5542ceb403558b1e
SHA51274f277d24157f3db3170efdb13a77a73fa466417cbba4829fb5f17064c5e5bc67a62cb0e48e8824549b8e4de147b5e4159b66dc79a1e14e18dc983dfb5b21ca1
-
C:\Users\Admin\AppData\Local\Temp\tmpA1AC.tmp.exeFilesize
78KB
MD5ae5163ffc61e2bd492dbe5aeb9c3ffcd
SHA14c2cb9dadf55bad462e4ba680226d05029910b07
SHA2568eafac4871f484e76fcd357d8e55fc51e9c6c4f5136b60d14585780b6839f740
SHA5124e090206c9fc5701a0bed9e5aa9b016da030fad2cdacf2c8851ff3317005ae55db4624011bda79e60c462a52ac1dd83dc39d645b1866a03982a997501e34d4f7
-
C:\Users\Admin\AppData\Local\Temp\vbcA2A5.tmpFilesize
660B
MD5654afd80e5e8f65175c20f89dc9f184e
SHA1d596d363849fc28dc5ef25a31877de31035c84fc
SHA2565f18382533170794aad22c5521001e7a7dbbe932c005cc2209f81f91658f7b35
SHA512a6d8e1c51b7837313a0242de9de85d7c7be50090b888d670ed33775445728ce3af9ced094810adcbaf51e41b7a280841a7999b0bcb67b89c05342634ff9971e3
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/1500-9-0x0000000074610000-0x0000000074BBB000-memory.dmpFilesize
5.7MB
-
memory/1500-18-0x0000000074610000-0x0000000074BBB000-memory.dmpFilesize
5.7MB
-
memory/2408-0-0x0000000074611000-0x0000000074612000-memory.dmpFilesize
4KB
-
memory/2408-1-0x0000000074610000-0x0000000074BBB000-memory.dmpFilesize
5.7MB
-
memory/2408-3-0x0000000074610000-0x0000000074BBB000-memory.dmpFilesize
5.7MB
-
memory/2408-24-0x0000000074610000-0x0000000074BBB000-memory.dmpFilesize
5.7MB