Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
5e33b6299facd682436d9b0d84ad2730N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e33b6299facd682436d9b0d84ad2730N.exe
Resource
win10v2004-20240709-en
General
-
Target
5e33b6299facd682436d9b0d84ad2730N.exe
-
Size
78KB
-
MD5
5e33b6299facd682436d9b0d84ad2730
-
SHA1
d009e6006dcc2d0581f691c7ed8a0d28fef0014e
-
SHA256
6ea273d6ad80b5408e1dcc62bd272160101aa68f1379bc7251b8de6b96ede5a7
-
SHA512
69551cbedee43567919cf761e0aead9c9f9147ec2ff9ed451c7e04829e0432cfae13d4a771ba30a5724e0a45f0927c3168d5892345501e62418b701cc0b0982a
-
SSDEEP
1536:VHY6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtRq9/YD1Si:VHYnhASyRxvhTzXPvCbW2URq9/K
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmpE7D0.tmp.exepid process 3028 tmpE7D0.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
5e33b6299facd682436d9b0d84ad2730N.exepid process 2996 5e33b6299facd682436d9b0d84ad2730N.exe 2996 5e33b6299facd682436d9b0d84ad2730N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpE7D0.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpE7D0.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cvtres.exetmpE7D0.tmp.exe5e33b6299facd682436d9b0d84ad2730N.exevbc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE7D0.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e33b6299facd682436d9b0d84ad2730N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5e33b6299facd682436d9b0d84ad2730N.exetmpE7D0.tmp.exedescription pid process Token: SeDebugPrivilege 2996 5e33b6299facd682436d9b0d84ad2730N.exe Token: SeDebugPrivilege 3028 tmpE7D0.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5e33b6299facd682436d9b0d84ad2730N.exevbc.exedescription pid process target process PID 2996 wrote to memory of 2072 2996 5e33b6299facd682436d9b0d84ad2730N.exe vbc.exe PID 2996 wrote to memory of 2072 2996 5e33b6299facd682436d9b0d84ad2730N.exe vbc.exe PID 2996 wrote to memory of 2072 2996 5e33b6299facd682436d9b0d84ad2730N.exe vbc.exe PID 2996 wrote to memory of 2072 2996 5e33b6299facd682436d9b0d84ad2730N.exe vbc.exe PID 2072 wrote to memory of 2004 2072 vbc.exe cvtres.exe PID 2072 wrote to memory of 2004 2072 vbc.exe cvtres.exe PID 2072 wrote to memory of 2004 2072 vbc.exe cvtres.exe PID 2072 wrote to memory of 2004 2072 vbc.exe cvtres.exe PID 2996 wrote to memory of 3028 2996 5e33b6299facd682436d9b0d84ad2730N.exe tmpE7D0.tmp.exe PID 2996 wrote to memory of 3028 2996 5e33b6299facd682436d9b0d84ad2730N.exe tmpE7D0.tmp.exe PID 2996 wrote to memory of 3028 2996 5e33b6299facd682436d9b0d84ad2730N.exe tmpE7D0.tmp.exe PID 2996 wrote to memory of 3028 2996 5e33b6299facd682436d9b0d84ad2730N.exe tmpE7D0.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e33b6299facd682436d9b0d84ad2730N.exe"C:\Users\Admin\AppData\Local\Temp\5e33b6299facd682436d9b0d84ad2730N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dnbfiz66.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE8DA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE8D9.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmpE7D0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE7D0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5e33b6299facd682436d9b0d84ad2730N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESE8DA.tmpFilesize
1KB
MD5b55da29f61f2bd14d2fcdacae545486b
SHA1fbac7618dd2b1f78fdb05bff9f6a2685d62378dc
SHA2567f7378f5c354c294ead0e0e1cff77536e1841b94cfdf54cee4fda01257c88724
SHA5122edf153d24f827411ae3b1839dac5f055dc07db6a6667a38ac799cf9c16eae8ea45d3b973a0afd6ff4d5a27a3b01b15240da4c7ce2fa07290b9af72cc5df1c4d
-
C:\Users\Admin\AppData\Local\Temp\dnbfiz66.0.vbFilesize
15KB
MD5200224afc4551840ab039259a1ca1d19
SHA16c6666e4d3c71ed35f69959beb7c0eecb9cfadc9
SHA2565c7cdfa85ab57890040cb44c0e047ebba917c9d0b8214e8311684ddbab09d1d5
SHA5122ac20ba569a20992f0652b3566295ad887bf96426b15a2eb173fc07bc79b8729357e7cb50aaaefe55e2dced354b04a388c665c2a9fe5f6a8b8dfd962fd68aab4
-
C:\Users\Admin\AppData\Local\Temp\dnbfiz66.cmdlineFilesize
266B
MD5a2adfe8b0a1340d941ef52661d410ea1
SHA13750916d5ee840eeb4d71610492b017de1b4afaa
SHA25664a496fa7eac6321c6729c4020dfce3ff96834a18572c4b8b942ef95289afb37
SHA512781c5b9048fa10267dcf45d79132b43614795a0683efb2f0da8d563c6cd638030a3282f5ca28ca45b01281c5c8d8a7a1c045940b768c8c481820d610477b76a7
-
C:\Users\Admin\AppData\Local\Temp\tmpE7D0.tmp.exeFilesize
78KB
MD5916935bae129c6a455339f510d7b3dcb
SHA1d82bc14bb25ccc6b3a020ad85a861f2754e63d1c
SHA256961a80321e2d200f47b35deca044c1ea8746504b78995576021b77554aa84438
SHA51218da3dadf3126f9cb75109dc292b71094111432a9b81aa0f1fbdc2a0b38eb032ed2d51469659a452fb443b6eaeeca2e3a2ae46ddd1d8903ab2057ae380ea18fd
-
C:\Users\Admin\AppData\Local\Temp\vbcE8D9.tmpFilesize
660B
MD5b302d62d43d996b7d82cb7f58bcae392
SHA1c07717723f70117bd89db4ca14592aa3f8d4027e
SHA25654b381c18fc9128636cb4a6c0d155971089bf40fe489c772899060f34cd12c69
SHA5125054c8bc1300570016fcae5ef9ce1908d0889025e513e72a302dba06e140661fdd4d4ddff37ffe9c35d21971da2aa8c94d26642f22071fe2ea8542c122a11281
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/2072-8-0x00000000741F0000-0x000000007479B000-memory.dmpFilesize
5.7MB
-
memory/2072-18-0x00000000741F0000-0x000000007479B000-memory.dmpFilesize
5.7MB
-
memory/2996-0-0x00000000741F1000-0x00000000741F2000-memory.dmpFilesize
4KB
-
memory/2996-1-0x00000000741F0000-0x000000007479B000-memory.dmpFilesize
5.7MB
-
memory/2996-2-0x00000000741F0000-0x000000007479B000-memory.dmpFilesize
5.7MB
-
memory/2996-24-0x00000000741F0000-0x000000007479B000-memory.dmpFilesize
5.7MB