Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
875aa8aeeb28f3646c22208934098420N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
875aa8aeeb28f3646c22208934098420N.exe
Resource
win10v2004-20240709-en
General
-
Target
875aa8aeeb28f3646c22208934098420N.exe
-
Size
78KB
-
MD5
875aa8aeeb28f3646c22208934098420
-
SHA1
7d8851d051042a454e26c1f31e540b21b8fc250c
-
SHA256
da8bcbbbf398154b18c1f9d8a4c2799af67aff835ee82c8f65365376d236b74c
-
SHA512
a577e9215c42f166e0c441792825412d9586d4edc7c3392c18942a108c40251ae77f4650e7444a031f64a620f3cd4a33014ca408a697db163481a8420e5f0e9a
-
SSDEEP
1536:xBWV5jSuAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti6o9/I1Td:rWV5jSuAtWDDILJLovbicqOq3o+nA9/4
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmpC909.tmp.exepid process 2140 tmpC909.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
875aa8aeeb28f3646c22208934098420N.exepid process 2416 875aa8aeeb28f3646c22208934098420N.exe 2416 875aa8aeeb28f3646c22208934098420N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpC909.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpC909.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
875aa8aeeb28f3646c22208934098420N.exevbc.execvtres.exetmpC909.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 875aa8aeeb28f3646c22208934098420N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpC909.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
875aa8aeeb28f3646c22208934098420N.exetmpC909.tmp.exedescription pid process Token: SeDebugPrivilege 2416 875aa8aeeb28f3646c22208934098420N.exe Token: SeDebugPrivilege 2140 tmpC909.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
875aa8aeeb28f3646c22208934098420N.exevbc.exedescription pid process target process PID 2416 wrote to memory of 2364 2416 875aa8aeeb28f3646c22208934098420N.exe vbc.exe PID 2416 wrote to memory of 2364 2416 875aa8aeeb28f3646c22208934098420N.exe vbc.exe PID 2416 wrote to memory of 2364 2416 875aa8aeeb28f3646c22208934098420N.exe vbc.exe PID 2416 wrote to memory of 2364 2416 875aa8aeeb28f3646c22208934098420N.exe vbc.exe PID 2364 wrote to memory of 2412 2364 vbc.exe cvtres.exe PID 2364 wrote to memory of 2412 2364 vbc.exe cvtres.exe PID 2364 wrote to memory of 2412 2364 vbc.exe cvtres.exe PID 2364 wrote to memory of 2412 2364 vbc.exe cvtres.exe PID 2416 wrote to memory of 2140 2416 875aa8aeeb28f3646c22208934098420N.exe tmpC909.tmp.exe PID 2416 wrote to memory of 2140 2416 875aa8aeeb28f3646c22208934098420N.exe tmpC909.tmp.exe PID 2416 wrote to memory of 2140 2416 875aa8aeeb28f3646c22208934098420N.exe tmpC909.tmp.exe PID 2416 wrote to memory of 2140 2416 875aa8aeeb28f3646c22208934098420N.exe tmpC909.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\875aa8aeeb28f3646c22208934098420N.exe"C:\Users\Admin\AppData\Local\Temp\875aa8aeeb28f3646c22208934098420N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qbo7cyly.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCA23.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCA13.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmpC909.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpC909.tmp.exe" C:\Users\Admin\AppData\Local\Temp\875aa8aeeb28f3646c22208934098420N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESCA23.tmpFilesize
1KB
MD5ee9bb4fc99c4cceeb4e6c6d331385a14
SHA170a1f4737aaa1838be7c3911924ee65e2f4058a1
SHA256b2d5d8aef1ccc2c7486282c1299d26d728b1a5ee9279af445d2f8f807018c52f
SHA512cab6e24bbeecedc597902519ae5519454f3d14587ef480240a5ab528dfdb79e0b61f51a09af946b8a290f685e03adf878202f225f35160c67abd83b4706a82b3
-
C:\Users\Admin\AppData\Local\Temp\qbo7cyly.0.vbFilesize
14KB
MD5bb71640497a5a797c9ed55ab810994bd
SHA1a94be960969b74a197a3bcf40a6a5eba36326f4b
SHA2569a3551f2ca9644b7e3b5f8c5a758ac7145db086bac9eeb1cfd99cb5a633f21dd
SHA51297fd73cab96a2c1f34bbb090a3fc4a6bc6160ef6adc8ee3777737030321c06edae1d2156f408f4057e6bc41084430029c403e7a634617e633202710ba2e8658a
-
C:\Users\Admin\AppData\Local\Temp\qbo7cyly.cmdlineFilesize
266B
MD5cf5e45ba445be123b119c98603a3f563
SHA1005dc997106043f1a38cbf7ac7b9a1b0c67fee86
SHA256def420c9a33c840cbaa248f6a384121f80bdd83eaf500cf01679e23082d78778
SHA512c88817285ca1a0836ce219c5cb32f268b33c1a171a52540e3bf4546cb9264aab17247e4e164892f7d5bb7cd13c29a572354b2f2a4fedb9a59a7061655c6ca4ea
-
C:\Users\Admin\AppData\Local\Temp\tmpC909.tmp.exeFilesize
78KB
MD5f7b413dc85ee2dd14d2ea1c593d90ae6
SHA137a89a56b204dfe4c290dc7b4a311553dcfa31ec
SHA2569c1ead7fd8754c561794345e89e50168cf5630dee933f84862351a176e224071
SHA512a5d478d365ff1fbbc54bdda5dce0593ba83f936495b3a52643a53e77eb67c46074b8ad612e984277bfe3fccd8fd71eeaed9ba7f6715a1c203c18ed3c29a7b838
-
C:\Users\Admin\AppData\Local\Temp\vbcCA13.tmpFilesize
660B
MD5f899797b0b089ee3b8fdbe4ce7fcf062
SHA11c268397419d8fbda02e1532a1ab19c2f9cbcbdf
SHA2569d3aa4dbdbaa6adb4eecb7858e5a733458b8d3bab71e2f0d33b16a5170c21fe6
SHA5127533426ee4f5b0ca90e5c7adef24a3347a946d02a9a5087ff6746888cd2817c889f5295e084b3f2a10fb677bd2b839463c3a01aff8bab4225acd44da6af9c4e1
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/2364-9-0x00000000744B0000-0x0000000074A5B000-memory.dmpFilesize
5.7MB
-
memory/2364-18-0x00000000744B0000-0x0000000074A5B000-memory.dmpFilesize
5.7MB
-
memory/2416-0-0x00000000744B1000-0x00000000744B2000-memory.dmpFilesize
4KB
-
memory/2416-1-0x00000000744B0000-0x0000000074A5B000-memory.dmpFilesize
5.7MB
-
memory/2416-2-0x00000000744B0000-0x0000000074A5B000-memory.dmpFilesize
5.7MB
-
memory/2416-23-0x00000000744B0000-0x0000000074A5B000-memory.dmpFilesize
5.7MB