Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe
Resource
win10v2004-20240709-en
General
-
Target
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe
-
Size
78KB
-
MD5
fac04255ae20a86fce9728aca8265b20
-
SHA1
8795f8c7f845319a981eeb2ffa42a380dee479ec
-
SHA256
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817
-
SHA512
5320b1d1b2457efaa4c5725dabddacd5fdd6dae0f7b8e6fb3251669df56049b379a5b3f233c8e902ec483b419294efdd08d43d7d476b5fd52aaadc51b1cf756a
-
SSDEEP
1536:Xe5jSILT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQtt6e9/YCGo1W:Xe5jSuE2EwR4uY41HyvYp9/YCGv
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe -
Deletes itself 1 IoCs
Processes:
tmp96B2.tmp.exepid process 2248 tmp96B2.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp96B2.tmp.exepid process 2248 tmp96B2.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp96B2.tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mscorsvc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sortkey.exe\"" tmp96B2.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exevbc.execvtres.exetmp96B2.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp96B2.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exetmp96B2.tmp.exedescription pid process Token: SeDebugPrivilege 3180 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe Token: SeDebugPrivilege 2248 tmp96B2.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exevbc.exedescription pid process target process PID 3180 wrote to memory of 4188 3180 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe vbc.exe PID 3180 wrote to memory of 4188 3180 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe vbc.exe PID 3180 wrote to memory of 4188 3180 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe vbc.exe PID 4188 wrote to memory of 4828 4188 vbc.exe cvtres.exe PID 4188 wrote to memory of 4828 4188 vbc.exe cvtres.exe PID 4188 wrote to memory of 4828 4188 vbc.exe cvtres.exe PID 3180 wrote to memory of 2248 3180 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe tmp96B2.tmp.exe PID 3180 wrote to memory of 2248 3180 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe tmp96B2.tmp.exe PID 3180 wrote to memory of 2248 3180 6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe tmp96B2.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe"C:\Users\Admin\AppData\Local\Temp\6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iznweoww.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES97EA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF71A67EFF1954D2B8B94C2DA1F6265D.TMP"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp96B2.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp96B2.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6be3cdd0c096a9b0b5e1a16bac34abe731d3ceb3eb183b0dbad1707f21204817.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES97EA.tmpFilesize
1KB
MD5c348562355e6b0635a2b6e969741b5e0
SHA1cf434c8fe80ccb12efd0c25da066cee9fd0049e5
SHA256744febb25968645a6c6c41d266983c4a58cb66b0f648723aea2b5454b4f54618
SHA5120427f8e1cfaef90c323843529579a63023a80f5d83ce44b0091dc028e9498fedf6030a32974718a2bcc0e71e3ead2b00152487c22330cc65b3571b1dfb8c6eac
-
C:\Users\Admin\AppData\Local\Temp\iznweoww.0.vbFilesize
14KB
MD55108146b77b7ebcce2712c808dd08173
SHA12142850646360d9386c506c82fa525958ccb948d
SHA256ceecaf92b77a3b4bb06ac9b6cc88a3c6fd9206baf9cf6de382275246abb291d3
SHA512d410bf60a205fd1e2c40150aeb1eec33906a5b604f8250cb3466378ac8fa2bbc1f17fc2dcbaf57f3b66ccd4841d34769ca617594a7b78429a410f1521c203520
-
C:\Users\Admin\AppData\Local\Temp\iznweoww.cmdlineFilesize
266B
MD51d85b4fe2dca2a3f557a499d0b71f05f
SHA164a41aa3b3d773f02fb9148c7cdd821a42a8f3e9
SHA256a12d2ee4bad7c3a583f8dee979ce4b77d8a17c8fcf0317d4b682a7df93027e89
SHA51211d5dcdd6bc627d3a06030dc58493f2c646ec191a30f57633f19fddb1cff23b209380384437f1395a0f4b1b39d9b0c81e8a7ad29bc6863838a329908cc6d2b5c
-
C:\Users\Admin\AppData\Local\Temp\tmp96B2.tmp.exeFilesize
78KB
MD52ba65ed42fc9d3b7d3c402e8b530c7d5
SHA13440bd7067bf117e063cacbe8fac63c88c389417
SHA25690402580e521f1e45db3c2f5857d0f443b3063561851df289bdbb87ccadeee50
SHA512032d9e94198acf38c82fecc785788eb241d7747f0b496711117e544228a9e5b5956bcd17eed0682732a6dca0a36eaa81a20f8a71d7aa471d28448b7cb3bd8d30
-
C:\Users\Admin\AppData\Local\Temp\vbcF71A67EFF1954D2B8B94C2DA1F6265D.TMPFilesize
660B
MD52bbacbee8c9eaf25307eca747fca9e79
SHA15fb4bdac118a0b0394f653c14f7ebcdfea354db7
SHA2564f62c922dab781e89692925f3b6c653ea01dc09dd828ec474b7da1cf992e7fd5
SHA512204e5b35e8dc5a52576583f6ad3f156b110bd5a26642de2da64968884dce46dc9bf603aee9680b4b5659f72e262dadce3bbcd60bf098036c50b825481dbc1a14
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD56870a276e0bed6dd5394d178156ebad0
SHA19b6005e5771bb4afb93a8862b54fe77dc4d203ee
SHA25669db906941dec2a7f1748ea1d15a058751c77d851ce54ea9e2ebdf1d6c7ed4f4
SHA5123b6f412d4bdf0939677ab6890a6417da6f737376e13375d2a60871de195aa14344b8340d254b819c850d75a443629cbf26f35533e07aaba9532fdc5284132809
-
memory/2248-23-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/2248-24-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/2248-26-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/2248-27-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/2248-28-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/3180-2-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/3180-0-0x0000000074DB2000-0x0000000074DB3000-memory.dmpFilesize
4KB
-
memory/3180-1-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/3180-22-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/4188-18-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB
-
memory/4188-9-0x0000000074DB0000-0x0000000075361000-memory.dmpFilesize
5.7MB