Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe
Resource
win10v2004-20240709-en
General
-
Target
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe
-
Size
78KB
-
MD5
6decbc4c1e25065e0b08cd3cc00c5193
-
SHA1
582f4c9820129ce54bd5c74e545099a0d5eb2c68
-
SHA256
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff
-
SHA512
7ae6290028171de3f86d2cf9e174c6604e57f5e5cb3e19e091ee5aceeab8547c063cc92d74834a35447db47538331b9fdc2d85501555618681df50941d7d2071
-
SSDEEP
1536:mHY6rdELT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQtLI9/9O1Yv:mHY8dSE2EwR4uY41HyvYLI9/H
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp23C6.tmp.exepid process 1876 tmp23C6.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exepid process 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp23C6.tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mscorsvc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sortkey.exe\"" tmp23C6.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exevbc.execvtres.exetmp23C6.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp23C6.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exetmp23C6.tmp.exedescription pid process Token: SeDebugPrivilege 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe Token: SeDebugPrivilege 1876 tmp23C6.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exevbc.exedescription pid process target process PID 2716 wrote to memory of 2720 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe vbc.exe PID 2716 wrote to memory of 2720 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe vbc.exe PID 2716 wrote to memory of 2720 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe vbc.exe PID 2716 wrote to memory of 2720 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe vbc.exe PID 2720 wrote to memory of 2852 2720 vbc.exe cvtres.exe PID 2720 wrote to memory of 2852 2720 vbc.exe cvtres.exe PID 2720 wrote to memory of 2852 2720 vbc.exe cvtres.exe PID 2720 wrote to memory of 2852 2720 vbc.exe cvtres.exe PID 2716 wrote to memory of 1876 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe tmp23C6.tmp.exe PID 2716 wrote to memory of 1876 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe tmp23C6.tmp.exe PID 2716 wrote to memory of 1876 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe tmp23C6.tmp.exe PID 2716 wrote to memory of 1876 2716 f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe tmp23C6.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe"C:\Users\Admin\AppData\Local\Temp\f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wleikvru.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2492.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2491.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp23C6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp23C6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f09c1ec858431fd0d2462cbe0e9eb5363e5564e8a709f1eb8c0cd3b681037dff.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES2492.tmpFilesize
1KB
MD5d11fa8c5ba0127d1273631b185398739
SHA1ed9df0ba12ca7f80ffbeb9adde9502bf553d8d6d
SHA25652f9242df07e778fc7767d862060b7802e049275c0018682b8823445acc8662a
SHA512a20ec45faa79e6317fe86fa66171467d57909a1183e422bf1007c8283119c03dd7608d0f019bfbd33790e113ec2577e6efde9e822ea7805a25db2110726292fa
-
C:\Users\Admin\AppData\Local\Temp\tmp23C6.tmp.exeFilesize
78KB
MD50ba125c8789e9cabbb7e931d91a056bc
SHA19203e443f9ed4b5e136edf36b01cbd3ce424282c
SHA25618f2b2c9379e3f32c80a8d548782012c298c5f44d8680488e1690349431897c8
SHA512e9a5ecf7ea3f999500326866438e6f54d5486c1811c309476a131fc6eccc0416bc11a37ee5aeb8c1a8432d62814b25a5730958b9654114625a86e8f6939b2339
-
C:\Users\Admin\AppData\Local\Temp\vbc2491.tmpFilesize
660B
MD506c9e30575a76e9078b3348a847e5d5c
SHA1ceb29e8f306b0f49e81b10d6546002077a77c39e
SHA25637259d75ddf2ee54bb550017eca80db23f92dbccc62f68272e3ff8cacef39b4d
SHA5120f72893e3248ca82084f50d1caa43f761ae7ef8153f437177f86299ef8df4c74bc38829a86b29628cd369b341cfcf006159dc11d0a4b6d669603a8a39028ffbb
-
C:\Users\Admin\AppData\Local\Temp\wleikvru.0.vbFilesize
15KB
MD5d293403390fe2c36172b27c64d5c8650
SHA17da8e06d74ca0eb27de9be37a7f6edbd09aa977b
SHA25601f36b19af186ed3cb30eefb5de7a90e1a42ed5fc80c954da69403245116524c
SHA51238d67d55a3a7709187f1841f754e5c2e526a22ca0e9d7fe9aae5768c220ea698c3295f660eaca8794dd68ee1dbdf0f56878e30e46f92566ebe58cf9e12cf8095
-
C:\Users\Admin\AppData\Local\Temp\wleikvru.cmdlineFilesize
266B
MD51bf064ecc0656f91ad4fbcaec55dc0ad
SHA17722fbd198aea327cf0c66945f5e1d17d980b282
SHA256c4469b0b939311c0a979cc97082c1707b698efa50aa68d7f0777ccc66bc99e59
SHA512b485a0b826d81302c563aafbffe3a53dd71cccc5f3d62cf7c6b89c1a33093c410fe802bb7678cb4456ff077a57c8c4157efc10e6e32da50ca51c7673d18cda3d
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD56870a276e0bed6dd5394d178156ebad0
SHA19b6005e5771bb4afb93a8862b54fe77dc4d203ee
SHA25669db906941dec2a7f1748ea1d15a058751c77d851ce54ea9e2ebdf1d6c7ed4f4
SHA5123b6f412d4bdf0939677ab6890a6417da6f737376e13375d2a60871de195aa14344b8340d254b819c850d75a443629cbf26f35533e07aaba9532fdc5284132809
-
memory/2716-0-0x00000000740C1000-0x00000000740C2000-memory.dmpFilesize
4KB
-
memory/2716-1-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/2716-6-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/2716-24-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/2720-8-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/2720-18-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB