Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe
Resource
win10v2004-20240709-en
General
-
Target
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe
-
Size
78KB
-
MD5
94e0cfa0f06092a53df124587a75f869
-
SHA1
3883232d684ad6ecbba631367a9afcc02f6ae814
-
SHA256
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873
-
SHA512
eb620cc884eceb228f623d3c85b79b4b86b668666b4733505ec827e76916d707feab4667c4a5af16508fe0226c06616e47afb99400eb530e5da5a9c7c6811d51
-
SSDEEP
1536:S4tHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt1d9/I1+o:S4tHY53Ln7N041Qqhg1d9/u
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp84DF.tmp.exepid process 2156 tmp84DF.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp84DF.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp84DF.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exevbc.execvtres.exetmp84DF.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp84DF.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exetmp84DF.tmp.exedescription pid process Token: SeDebugPrivilege 4288 cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe Token: SeDebugPrivilege 2156 tmp84DF.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exevbc.exedescription pid process target process PID 4288 wrote to memory of 448 4288 cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe vbc.exe PID 4288 wrote to memory of 448 4288 cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe vbc.exe PID 4288 wrote to memory of 448 4288 cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe vbc.exe PID 448 wrote to memory of 3420 448 vbc.exe cvtres.exe PID 448 wrote to memory of 3420 448 vbc.exe cvtres.exe PID 448 wrote to memory of 3420 448 vbc.exe cvtres.exe PID 4288 wrote to memory of 2156 4288 cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe tmp84DF.tmp.exe PID 4288 wrote to memory of 2156 4288 cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe tmp84DF.tmp.exe PID 4288 wrote to memory of 2156 4288 cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe tmp84DF.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe"C:\Users\Admin\AppData\Local\Temp\cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\9chtngop.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8C90.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc26BED73C93B24B448A8585971C8E4BC.TMP"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp84DF.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp84DF.tmp.exe" C:\Users\Admin\AppData\Local\Temp\cc1b6df29a77888c596538d30d214c15f3d9f1c17d707b4a99e2894db2cc8873.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9chtngop.0.vbFilesize
15KB
MD575b0ab4737bc86853db81ec96a956f7d
SHA1e21ba688cce82bf9091074d70d3693d5d5197ac1
SHA2563ea9c0d8ab3ea999a3d2143a53e64c026d5c2a477def941a15544abadb6710a2
SHA5123e159ae6e9f979e38defc29d5f1f027cc20a3e63af93b388ce70d215450956faea254dc3337c0f4518ddec5c3cfb58c7e3b2bc688e32e90f9f181f359b1e3c07
-
C:\Users\Admin\AppData\Local\Temp\9chtngop.cmdlineFilesize
266B
MD5c9e66ff8a1b8b9ca87a3b3b2c4ad9a35
SHA14ac0a4aef9b455f813349aceb2ce7060e8328604
SHA2564781a24fdcb8e4a084bb06a3cb3e32d639f7d87e92e7b584b31c2c9e250e4761
SHA512432fc595f4ebfdfa905f1193fd52703f865235fea33ac6a91697a07dbc1fd00723de4435f4cd5401d733e352dfb2a809e3a0b9d7d86b892013c0ac99ee58d5bd
-
C:\Users\Admin\AppData\Local\Temp\RES8C90.tmpFilesize
1KB
MD51d3e72b1af9dd2dd50276d91776af7ba
SHA1bfbce64a859ae678fad4723c03b25b2d1224954b
SHA256ccff87870740b673ca1b47948f23fdac4b221e8ed208d31417648c4b1f9078dd
SHA5122143fa3f098df0aacbc504de6c068f690a4d55d5f97eebf60f0949ae057fadbf1db01e233e764e0d40f2de0b240285dc529ade89093fd65981dbcd53b58d7bb0
-
C:\Users\Admin\AppData\Local\Temp\tmp84DF.tmp.exeFilesize
78KB
MD5bf28f6ce2d96606d106d5374818dddaa
SHA150676a6d8a58663c6f978512f769aa443d326b0f
SHA2563ee794340553f5b251b34a080aef8f6bc58b2a5eb86d7789de4fecc4e649e01f
SHA51222ef123e08a5993e9d3cedc496cba61f662ac9da36c36918553df30f3c3a47db5e82215274e35cb979ffccffdea40c11b1fac921dcbeedd6a2ff33b7310a1b33
-
C:\Users\Admin\AppData\Local\Temp\vbc26BED73C93B24B448A8585971C8E4BC.TMPFilesize
660B
MD5b94b8d58c3f51de04e77b683b67ac039
SHA1027cb73d63c718c1335261b01dec1b6e0092030a
SHA256cc29d0887b6894057b1f63a45caecb46bbf3a12b9d78ce5cbd2aece32d4cd444
SHA512a7c477d81028f43b36d76f8df0d2d7edee5d26b35f44365a859d7e38ad2aad69d51e89ba9f98ca1530b6f06bfb57f345445c6af328e0e9e580941351c5e79767
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
memory/448-8-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/448-18-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/2156-23-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/2156-24-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/2156-25-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/2156-27-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/2156-28-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/2156-29-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/4288-0-0x0000000074EF2000-0x0000000074EF3000-memory.dmpFilesize
4KB
-
memory/4288-2-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/4288-1-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB
-
memory/4288-22-0x0000000074EF0000-0x00000000754A1000-memory.dmpFilesize
5.7MB