Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe
Resource
win10v2004-20240709-en
General
-
Target
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe
-
Size
78KB
-
MD5
17890bed103398d6ec4b31c1b1fec255
-
SHA1
0e318c585a2612df55b9990d3aae0a519222558c
-
SHA256
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467
-
SHA512
10b1c592be924f98473344d54ff6fabaa3ac76ca88bb886038975dc775e47c84b65fb9e144340b0f52d63dbc7e013eae9575f0ceaba19070096817f18b5044e9
-
SSDEEP
1536:nuHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtRb9/eR1ac:nuHFonhASyRxvhTzXPvCbW2URb9/e/
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp84F8.tmp.exepid process 2568 tmp84F8.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exepid process 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp84F8.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp84F8.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exevbc.execvtres.exetmp84F8.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp84F8.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exetmp84F8.tmp.exedescription pid process Token: SeDebugPrivilege 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe Token: SeDebugPrivilege 2568 tmp84F8.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exevbc.exedescription pid process target process PID 2292 wrote to memory of 2028 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe vbc.exe PID 2292 wrote to memory of 2028 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe vbc.exe PID 2292 wrote to memory of 2028 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe vbc.exe PID 2292 wrote to memory of 2028 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe vbc.exe PID 2028 wrote to memory of 2420 2028 vbc.exe cvtres.exe PID 2028 wrote to memory of 2420 2028 vbc.exe cvtres.exe PID 2028 wrote to memory of 2420 2028 vbc.exe cvtres.exe PID 2028 wrote to memory of 2420 2028 vbc.exe cvtres.exe PID 2292 wrote to memory of 2568 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe tmp84F8.tmp.exe PID 2292 wrote to memory of 2568 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe tmp84F8.tmp.exe PID 2292 wrote to memory of 2568 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe tmp84F8.tmp.exe PID 2292 wrote to memory of 2568 2292 f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe tmp84F8.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe"C:\Users\Admin\AppData\Local\Temp\f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e0qqtwzi.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES85C4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc85C3.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp84F8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp84F8.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f0f57f7c66154b69866d3418cc00a3ce24379c20c814ee88a16dc2cc3568e467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES85C4.tmpFilesize
1KB
MD543ad80d9fa151dc5c45670292716a978
SHA1cabf1471edccc46896718f56aa98d57a25b05afd
SHA25676cc545b92eaf377091783fd3e1ee6afd86ca7709101c5bd3cdf76a993667394
SHA51200e4d125ebbad6d0fddd18c595ec3b0df6eb388f29606a7426f548571d06a605e0833ca57627e96b48104fbefd570afa14512c27eaa32a6e132109b0fcf7fec3
-
C:\Users\Admin\AppData\Local\Temp\e0qqtwzi.0.vbFilesize
15KB
MD51ca3476e4efc13f7b53965797e787524
SHA1538326ed3a32f4565e020a8d76e15c66694e9dc4
SHA2560f7302d1cae82915188c062d6e1df39fa43706d9ba2bd8bc1aec48d55424bcda
SHA512e9c54f32c1f21e6ead0a8a896c964565730ee7602ae10f58540a91e1100293ebe415eb84eeefb88cba325f5a5109f555ff418d65537c208dc55c8309fffc0329
-
C:\Users\Admin\AppData\Local\Temp\e0qqtwzi.cmdlineFilesize
266B
MD59555af1825a65d10df262dcca1031a09
SHA155f25e84e2124cdcc0f08d40eea43f19f2c32b40
SHA2566cb7b7b16cab2470783dab32c437a31769a9c007a51a02f1825ea95e88d5448b
SHA512e0f57341505ae619af16fe8fac820721b43830dd1436e4e63e23c9fb2d798149930646dee14b737b40beb803b672d71e54afae007de17412f6080e169d2e849e
-
C:\Users\Admin\AppData\Local\Temp\tmp84F8.tmp.exeFilesize
78KB
MD5d8a6b140ac58b9bf47b426128ad86b88
SHA1c7dd924e95ebc1e416028e9531e8ff635ab39df8
SHA256f261740d7aae03c4d7e6a8689ac2e65ff2c035cbdef3988d7acd37b1af02fe58
SHA512880168cf2e47ae75b352a4f860c26bfe4861c1d942aea3a93c4c7c6af03189e50f72b3225646b6fdae13f9b93861d54853b34b604e6ca54d84468c5958466bbe
-
C:\Users\Admin\AppData\Local\Temp\vbc85C3.tmpFilesize
660B
MD5e5d126c748adde3523500e4b57f180a0
SHA1692e4f03d10fa0ba6a9b900b5e1c57b6ec50939a
SHA2565cee9f1b73fa5797690d30f448c2be6548e8234caddfa438d94e2058034db8ad
SHA512b3cca473edc8cc0e8b225a6c4a9b3d0386228a6aba3696d1d6c9d0d894e28233989eba3641c41e2b1d00d906f64fe2e9631aee01b8da665afb10b22da514d37f
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/2028-9-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB
-
memory/2028-18-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB
-
memory/2292-0-0x00000000745A1000-0x00000000745A2000-memory.dmpFilesize
4KB
-
memory/2292-1-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB
-
memory/2292-2-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB
-
memory/2292-24-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB