Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe
-
Size
78KB
-
MD5
7f8d9f9b10b2dd136c2703db3c2bf6c0
-
SHA1
f007132a9fb91d4ca34bc43576a9358fa98e9c41
-
SHA256
e36fa70a6012d67d2c14393d1261f99a51683a726f8f0cf2e99cf7d053a930b2
-
SHA512
a2471f982ecee25f36539c6298b7f65e67bc5030765cf3197759288b006020bb15feaf406dfe7b741d5dd280a603d372514548f31d58e2a7dd1e2dbd08400b27
-
SSDEEP
1536:dRWV5jGXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6e9/OO1cd:dRWV5jOSyRxvhTzXPvCbW2Ux9/w
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
Processes:
tmp76C5.tmp.exepid process 2720 tmp76C5.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
7f8d9f9b10b2dd136c2703db3c2bf6c0N.exepid process 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp76C5.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp76C5.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7f8d9f9b10b2dd136c2703db3c2bf6c0N.exevbc.execvtres.exetmp76C5.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp76C5.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7f8d9f9b10b2dd136c2703db3c2bf6c0N.exetmp76C5.tmp.exedescription pid process Token: SeDebugPrivilege 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe Token: SeDebugPrivilege 2720 tmp76C5.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7f8d9f9b10b2dd136c2703db3c2bf6c0N.exevbc.exedescription pid process target process PID 2856 wrote to memory of 2616 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe vbc.exe PID 2856 wrote to memory of 2616 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe vbc.exe PID 2856 wrote to memory of 2616 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe vbc.exe PID 2856 wrote to memory of 2616 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe vbc.exe PID 2616 wrote to memory of 2436 2616 vbc.exe cvtres.exe PID 2616 wrote to memory of 2436 2616 vbc.exe cvtres.exe PID 2616 wrote to memory of 2436 2616 vbc.exe cvtres.exe PID 2616 wrote to memory of 2436 2616 vbc.exe cvtres.exe PID 2856 wrote to memory of 2720 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe tmp76C5.tmp.exe PID 2856 wrote to memory of 2720 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe tmp76C5.tmp.exe PID 2856 wrote to memory of 2720 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe tmp76C5.tmp.exe PID 2856 wrote to memory of 2720 2856 7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe tmp76C5.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe"C:\Users\Admin\AppData\Local\Temp\7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oxmuw0ku.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES781E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc781D.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp76C5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp76C5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7f8d9f9b10b2dd136c2703db3c2bf6c0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES781E.tmpFilesize
1KB
MD57221d7228f1d169770a220487d1dca65
SHA1cf71ed2e7f4b74ac872ba45fd3a9735731932dcc
SHA256bf4cbf3155bf36ecf7c8f91d6952dd15e7676f14c295552b4ea8a3bbe7a0f71d
SHA5124773801b99fd03bab56c305727a8f1935f45616778d65bef0a91186da323ff35c4c443f836f8b2063673e8fd9c1dbe1e81646594236badbf68f1adc3936e1310
-
C:\Users\Admin\AppData\Local\Temp\oxmuw0ku.0.vbFilesize
14KB
MD53fefff7a57c0303a17ebefdd3dc4d58f
SHA10d69fccc9ac782e2f043401f86d9ddeb800e7ff4
SHA256b7d609c11934a0b1f8728384882a26734a48963c2f2ee00315edc256f20d4f69
SHA512cb826888fb1ebf40b40c04baeb66aa0de1a42940ec9967a868f9fa195d92fd4541d11f6adb93a4f8be954253f2b30448ce20cb47d6e153e175b16d8775bd46b9
-
C:\Users\Admin\AppData\Local\Temp\oxmuw0ku.cmdlineFilesize
266B
MD5b17b5a3591570807496a42ce2f846c7c
SHA17885406db7828da190b7252c06621b7fb87c1066
SHA256f986f3ec24325e786bfb23f8ced9881cebc8ba75f8886415e7724b353cefab65
SHA512903fdb3440c0745c2f7af7f30ec88a2de096812c0d0483e6cffe9adc9b7629b13ffadceb6f122f14fad0b890b91fb850dcc6a1d544127ee369d921984081c2cb
-
C:\Users\Admin\AppData\Local\Temp\tmp76C5.tmp.exeFilesize
78KB
MD59525851641851bb0c01e9fe0f66ff610
SHA12274d171ee72cfaeae93861095ed26e10ce8449d
SHA256e435a93fca9bae08cd49f87309077f6e2eeea6ac32cd1841e44023aa05c7e0cf
SHA51223d17ba6020290deb7e742109aa006f753a8c922dc79deabb6ff8813944ba9589d629154f0ea8947bcf5237cc7424841576f447d036b74544513eadb39698daf
-
C:\Users\Admin\AppData\Local\Temp\vbc781D.tmpFilesize
660B
MD556c3a360e2852e62cb83dfb3e4a0898f
SHA1244cfdf53f4ba1aed4191a2aebd586c6d36a7200
SHA25686a753ddb447fa5ba7766c1fb2748536439c9e03a3db114069576397f7c4d3a2
SHA51202ded8278ea36cc67fbc0dcd3b97a0bc8acc33841e176202cb2b508d51153d2849b17b5f6ea1567ef81d846f3d49e18c11d882b4b14bf7faca1f205804d47883
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/2616-9-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/2616-18-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/2856-0-0x0000000074701000-0x0000000074702000-memory.dmpFilesize
4KB
-
memory/2856-1-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/2856-2-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/2856-24-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB