Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
f1d01ea6044cb2a122fa7915b1ec8ad0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f1d01ea6044cb2a122fa7915b1ec8ad0N.exe
Resource
win10v2004-20240709-en
General
-
Target
f1d01ea6044cb2a122fa7915b1ec8ad0N.exe
-
Size
78KB
-
MD5
f1d01ea6044cb2a122fa7915b1ec8ad0
-
SHA1
f9fbf2bdd67d452ed788005ac567c4375fc5eec3
-
SHA256
b8f64d354e9100cdf85f344baa8419d7b8aa03a6596766098807466b9aa451bd
-
SHA512
f48e6ec3a7324ac7c9ab713f06e0083f2f3061c7a1c6c19abb257990997f73565c3c339ae76cc4dd9f2715d93aebe7e798b0d30e0d76ea66ea5fa412ef8cc813
-
SSDEEP
1536:AoPWtHHuaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtZ9/Z1D:nPWtH/3ZAtWDDILJLovbicqOq3o+nZ9v
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f1d01ea6044cb2a122fa7915b1ec8ad0N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation f1d01ea6044cb2a122fa7915b1ec8ad0N.exe -
Executes dropped EXE 1 IoCs
Processes:
tmpAE41.tmp.exepid process 3372 tmpAE41.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpAE41.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpAE41.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tmpAE41.tmp.exef1d01ea6044cb2a122fa7915b1ec8ad0N.exevbc.execvtres.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAE41.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1d01ea6044cb2a122fa7915b1ec8ad0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f1d01ea6044cb2a122fa7915b1ec8ad0N.exetmpAE41.tmp.exedescription pid process Token: SeDebugPrivilege 4112 f1d01ea6044cb2a122fa7915b1ec8ad0N.exe Token: SeDebugPrivilege 3372 tmpAE41.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f1d01ea6044cb2a122fa7915b1ec8ad0N.exevbc.exedescription pid process target process PID 4112 wrote to memory of 3340 4112 f1d01ea6044cb2a122fa7915b1ec8ad0N.exe vbc.exe PID 4112 wrote to memory of 3340 4112 f1d01ea6044cb2a122fa7915b1ec8ad0N.exe vbc.exe PID 4112 wrote to memory of 3340 4112 f1d01ea6044cb2a122fa7915b1ec8ad0N.exe vbc.exe PID 3340 wrote to memory of 444 3340 vbc.exe cvtres.exe PID 3340 wrote to memory of 444 3340 vbc.exe cvtres.exe PID 3340 wrote to memory of 444 3340 vbc.exe cvtres.exe PID 4112 wrote to memory of 3372 4112 f1d01ea6044cb2a122fa7915b1ec8ad0N.exe tmpAE41.tmp.exe PID 4112 wrote to memory of 3372 4112 f1d01ea6044cb2a122fa7915b1ec8ad0N.exe tmpAE41.tmp.exe PID 4112 wrote to memory of 3372 4112 f1d01ea6044cb2a122fa7915b1ec8ad0N.exe tmpAE41.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1d01ea6044cb2a122fa7915b1ec8ad0N.exe"C:\Users\Admin\AppData\Local\Temp\f1d01ea6044cb2a122fa7915b1ec8ad0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1f6fvsod.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAF89.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4F3FB41D50249E081FE5E44F5D9083.TMP"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmpAE41.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAE41.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f1d01ea6044cb2a122fa7915b1ec8ad0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1f6fvsod.0.vbFilesize
15KB
MD50c77a075d146049ba55474f8ccc76d26
SHA17da48d50b8624efe3c192cfe0c7eb62a7fa02d95
SHA2564d8a701ca21cf9f28cecd4eccb44eefb84b91355400f53b922eba0abce071a38
SHA512859230294484a8ea44e84061167e520bd4523dd931d43e61ccb8aaff68ee6eaf831b7447ef1cd0311fce00b0cd63aa5d079f41e1ddfb9ea89e929936917f8565
-
C:\Users\Admin\AppData\Local\Temp\1f6fvsod.cmdlineFilesize
266B
MD5db132060627ae9ab03940e43ce2988ed
SHA1e6457d8252676afacd4f48d1aabde714108ccf2e
SHA256b728bb80cf476e043cdf8cf53952945e56e2a5681d1c98b620e5592f3a154639
SHA512c7ada1bc52d0912ca54f69a2738ca8acf97172842b1f36c8788362aa70656bfca702a495674c4b5b0267c673f78860389e8b9716c93d2c92d66c36d62f77b0f9
-
C:\Users\Admin\AppData\Local\Temp\RESAF89.tmpFilesize
1KB
MD524c1a44d8155b8f572beb4a7699e2521
SHA1e665d0a23049bbb73e227451e131540336ba5088
SHA25607ebdc250532806656f65be5aab62e2b6d0afb752e8e43d48aecfc4922e0678f
SHA512f54592d088d20d524e75b48d985db0adbac415904ff3f569c6f2032da7ea9f0906e71fe9281c2f1c673ef8763bfb52d57012fd81a62a9e76ae88ae8eea3c7c23
-
C:\Users\Admin\AppData\Local\Temp\tmpAE41.tmp.exeFilesize
78KB
MD5f38b25684524db771c85da53e3cfab44
SHA1c611b039c81cfdf7e9b5e30dd6e9bbd6b35ae22e
SHA256765dd81b80c2988ebf8b00a2627ce3320d896b8ee923a2da76381e7cca346cf5
SHA512748df7db1cd908a44d912d6db0be0684e6f93a07f467e73f0b065949eade3b762fbaa37994c491b4ca64f85fff9daa31842164af2c4a85efb00b55f31b97c941
-
C:\Users\Admin\AppData\Local\Temp\vbc4F3FB41D50249E081FE5E44F5D9083.TMPFilesize
660B
MD5d173419edc388409fce8487c20bdf04c
SHA146ed3560d0943ef4cef626d9dd0b4aabd90431ef
SHA25617c13162cf74b76852bbd0ed371bcef541446ef79bc8d27156660f5a6f87069c
SHA5122659e89b7d96f5750686c538f7530c34d505c75d741e71b9049915caabb7fe4a1340f15ae7e640d16cc281e29ba2613ecc76fa7e1cf596866b5436f7ce42b522
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/3340-18-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/3340-9-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/3372-23-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/3372-24-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/3372-25-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/3372-26-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/3372-27-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/3372-28-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/4112-0-0x0000000074EB2000-0x0000000074EB3000-memory.dmpFilesize
4KB
-
memory/4112-2-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/4112-1-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB
-
memory/4112-22-0x0000000074EB0000-0x0000000075461000-memory.dmpFilesize
5.7MB