Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 00:20
Static task
static1
Behavioral task
behavioral1
Sample
3bbf562527e29091bb75e829c2992850N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3bbf562527e29091bb75e829c2992850N.exe
Resource
win10v2004-20240709-en
General
-
Target
3bbf562527e29091bb75e829c2992850N.exe
-
Size
78KB
-
MD5
3bbf562527e29091bb75e829c2992850
-
SHA1
c9533421ce13b9b8e167544b0862414502813a95
-
SHA256
eee6b012e88a2c757fcdadfdc681e5c6ab2f748f84b8b1e8037340b1b8a2104d
-
SHA512
3d90b6094883356d8e6dda649bab6e553ce5b08cadd8316e390ee343b2e74732531af0e7b685707b7a839da5656f73d7bbf7326299e4d7f8018bce425aa480eb
-
SSDEEP
1536:5csHY6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qt59/a1f5:asHYI3ZAtWDDILJLovbicqOq3o+n59/O
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp9869.tmp.exepid process 2696 tmp9869.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
3bbf562527e29091bb75e829c2992850N.exepid process 1656 3bbf562527e29091bb75e829c2992850N.exe 1656 3bbf562527e29091bb75e829c2992850N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp9869.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp9869.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3bbf562527e29091bb75e829c2992850N.exevbc.execvtres.exetmp9869.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bbf562527e29091bb75e829c2992850N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9869.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3bbf562527e29091bb75e829c2992850N.exetmp9869.tmp.exedescription pid process Token: SeDebugPrivilege 1656 3bbf562527e29091bb75e829c2992850N.exe Token: SeDebugPrivilege 2696 tmp9869.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3bbf562527e29091bb75e829c2992850N.exevbc.exedescription pid process target process PID 1656 wrote to memory of 1892 1656 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 1656 wrote to memory of 1892 1656 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 1656 wrote to memory of 1892 1656 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 1656 wrote to memory of 1892 1656 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 1892 wrote to memory of 2684 1892 vbc.exe cvtres.exe PID 1892 wrote to memory of 2684 1892 vbc.exe cvtres.exe PID 1892 wrote to memory of 2684 1892 vbc.exe cvtres.exe PID 1892 wrote to memory of 2684 1892 vbc.exe cvtres.exe PID 1656 wrote to memory of 2696 1656 3bbf562527e29091bb75e829c2992850N.exe tmp9869.tmp.exe PID 1656 wrote to memory of 2696 1656 3bbf562527e29091bb75e829c2992850N.exe tmp9869.tmp.exe PID 1656 wrote to memory of 2696 1656 3bbf562527e29091bb75e829c2992850N.exe tmp9869.tmp.exe PID 1656 wrote to memory of 2696 1656 3bbf562527e29091bb75e829c2992850N.exe tmp9869.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bbf562527e29091bb75e829c2992850N.exe"C:\Users\Admin\AppData\Local\Temp\3bbf562527e29091bb75e829c2992850N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\j1ucalmt.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9954.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9953.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp9869.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9869.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3bbf562527e29091bb75e829c2992850N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES9954.tmpFilesize
1KB
MD5b9eb8478a36ba9218f6069cbc259f274
SHA155d1d860ee0b020aa7291fa6d400e6c586bf8f57
SHA25636997beb6caa00e1e79b7e670811641b456a0e69aa79f10b345a52a1cd8dfc57
SHA512f21d6b02f03315d486b7f8b4c25f82986ba25004c979372044b62925d956e7e54cdfa92077cb6ced6cb7f769b668646868fced71be1cd17f6d9b22888cc14a33
-
C:\Users\Admin\AppData\Local\Temp\j1ucalmt.0.vbFilesize
15KB
MD52bb83e8f525826591f481a304dd000c6
SHA107a9363a8f3f8ce8ed940d81a01fc28aac36a08c
SHA256db163abe3a492f98c4fb2c0b9a44f51ed6a348c0519fc782affbf17a8ee2ae02
SHA512ee3580de2fe66ec01895a25dae534cc449f6c342bae9a76046d2a25ad2ada4a9266ac1279bc4ce7029f138408f98334ca26617e4580f0cd00b46774f2c8e6b68
-
C:\Users\Admin\AppData\Local\Temp\j1ucalmt.cmdlineFilesize
266B
MD506a238db4f9879189576c972f94b032b
SHA10ab9e6ae0da07f764252f9b70c8f1d6e7943b61d
SHA2564bbc04b0b21b15a76ee04a0e679e05086ec35ecc23de01b5a5907d2727ed85f4
SHA512d74275fe71d82abe47885212874aeaa0d9197e4edbbce9bb5a7fa5047f91716901f16fcab91bedeb41b0c2d2102b5af263a9b7b0ee9a65725fea187b2042b9bf
-
C:\Users\Admin\AppData\Local\Temp\tmp9869.tmp.exeFilesize
78KB
MD5252bfddb66909ca3a8d4ab6a00c5ce85
SHA1632b2e48bd0573142c646f8dbd7ca3fc04b79c5a
SHA256228356c505f8ea2e7ed1c078e4f0ed2e63a2cc1cded89aa32afc0716f8352c59
SHA5127aa2f1ca5d430ce4385e7bd206df14db25c4f3c07002ee8b90344025edfa696aed76a723eb2f0fb27ff1f496dadc29e442108629faffbb82165e8344beb01c27
-
C:\Users\Admin\AppData\Local\Temp\vbc9953.tmpFilesize
660B
MD5815ca81aba4be7934482d406d6b0054d
SHA1d16210b7d726f815e29ed89705af58cebb5976f7
SHA256d094f123a5558343f26bfb0e9df5b16dd10b399ebd1ea8bd42a19c6987a6b9c0
SHA5128e21012d70305a2cdee907bc8b332ba07ed00baf050045e18e9dd1ce1e192e637b6a6c2e00b3acda720768c62e5cd11db18b3815938643ba0c097aae2ccc8fd4
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/1656-0-0x0000000074F31000-0x0000000074F32000-memory.dmpFilesize
4KB
-
memory/1656-1-0x0000000074F30000-0x00000000754DB000-memory.dmpFilesize
5.7MB
-
memory/1656-2-0x0000000074F30000-0x00000000754DB000-memory.dmpFilesize
5.7MB
-
memory/1656-24-0x0000000074F30000-0x00000000754DB000-memory.dmpFilesize
5.7MB
-
memory/1892-8-0x0000000074F30000-0x00000000754DB000-memory.dmpFilesize
5.7MB
-
memory/1892-18-0x0000000074F30000-0x00000000754DB000-memory.dmpFilesize
5.7MB