Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 20:03

General

  • Target

    f1d01ea6044cb2a122fa7915b1ec8ad0N.exe

  • Size

    78KB

  • MD5

    f1d01ea6044cb2a122fa7915b1ec8ad0

  • SHA1

    f9fbf2bdd67d452ed788005ac567c4375fc5eec3

  • SHA256

    b8f64d354e9100cdf85f344baa8419d7b8aa03a6596766098807466b9aa451bd

  • SHA512

    f48e6ec3a7324ac7c9ab713f06e0083f2f3061c7a1c6c19abb257990997f73565c3c339ae76cc4dd9f2715d93aebe7e798b0d30e0d76ea66ea5fa412ef8cc813

  • SSDEEP

    1536:AoPWtHHuaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtZ9/Z1D:nPWtH/3ZAtWDDILJLovbicqOq3o+nZ9v

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1d01ea6044cb2a122fa7915b1ec8ad0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f1d01ea6044cb2a122fa7915b1ec8ad0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1f6fvsod.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAF89.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4F3FB41D50249E081FE5E44F5D9083.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:444
    • C:\Users\Admin\AppData\Local\Temp\tmpAE41.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpAE41.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f1d01ea6044cb2a122fa7915b1ec8ad0N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3372

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1f6fvsod.0.vb
    Filesize

    15KB

    MD5

    0c77a075d146049ba55474f8ccc76d26

    SHA1

    7da48d50b8624efe3c192cfe0c7eb62a7fa02d95

    SHA256

    4d8a701ca21cf9f28cecd4eccb44eefb84b91355400f53b922eba0abce071a38

    SHA512

    859230294484a8ea44e84061167e520bd4523dd931d43e61ccb8aaff68ee6eaf831b7447ef1cd0311fce00b0cd63aa5d079f41e1ddfb9ea89e929936917f8565

  • C:\Users\Admin\AppData\Local\Temp\1f6fvsod.cmdline
    Filesize

    266B

    MD5

    db132060627ae9ab03940e43ce2988ed

    SHA1

    e6457d8252676afacd4f48d1aabde714108ccf2e

    SHA256

    b728bb80cf476e043cdf8cf53952945e56e2a5681d1c98b620e5592f3a154639

    SHA512

    c7ada1bc52d0912ca54f69a2738ca8acf97172842b1f36c8788362aa70656bfca702a495674c4b5b0267c673f78860389e8b9716c93d2c92d66c36d62f77b0f9

  • C:\Users\Admin\AppData\Local\Temp\RESAF89.tmp
    Filesize

    1KB

    MD5

    24c1a44d8155b8f572beb4a7699e2521

    SHA1

    e665d0a23049bbb73e227451e131540336ba5088

    SHA256

    07ebdc250532806656f65be5aab62e2b6d0afb752e8e43d48aecfc4922e0678f

    SHA512

    f54592d088d20d524e75b48d985db0adbac415904ff3f569c6f2032da7ea9f0906e71fe9281c2f1c673ef8763bfb52d57012fd81a62a9e76ae88ae8eea3c7c23

  • C:\Users\Admin\AppData\Local\Temp\tmpAE41.tmp.exe
    Filesize

    78KB

    MD5

    f38b25684524db771c85da53e3cfab44

    SHA1

    c611b039c81cfdf7e9b5e30dd6e9bbd6b35ae22e

    SHA256

    765dd81b80c2988ebf8b00a2627ce3320d896b8ee923a2da76381e7cca346cf5

    SHA512

    748df7db1cd908a44d912d6db0be0684e6f93a07f467e73f0b065949eade3b762fbaa37994c491b4ca64f85fff9daa31842164af2c4a85efb00b55f31b97c941

  • C:\Users\Admin\AppData\Local\Temp\vbc4F3FB41D50249E081FE5E44F5D9083.TMP
    Filesize

    660B

    MD5

    d173419edc388409fce8487c20bdf04c

    SHA1

    46ed3560d0943ef4cef626d9dd0b4aabd90431ef

    SHA256

    17c13162cf74b76852bbd0ed371bcef541446ef79bc8d27156660f5a6f87069c

    SHA512

    2659e89b7d96f5750686c538f7530c34d505c75d741e71b9049915caabb7fe4a1340f15ae7e640d16cc281e29ba2613ecc76fa7e1cf596866b5436f7ce42b522

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources
    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/3340-18-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/3340-9-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/3372-23-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/3372-24-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/3372-25-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/3372-26-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/3372-27-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/3372-28-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/4112-0-0x0000000074EB2000-0x0000000074EB3000-memory.dmp
    Filesize

    4KB

  • memory/4112-2-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/4112-1-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB

  • memory/4112-22-0x0000000074EB0000-0x0000000075461000-memory.dmp
    Filesize

    5.7MB