Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 03:21

General

  • Target

    dcf3c61426860a4cc128ab3a5408db291b9a57ad97b6c961efe53fdade34a47e.exe

  • Size

    78KB

  • MD5

    97d5712e916fd4dc5800a399cda78145

  • SHA1

    500c7831791112d76a27d949a138fb3044ec1325

  • SHA256

    dcf3c61426860a4cc128ab3a5408db291b9a57ad97b6c961efe53fdade34a47e

  • SHA512

    8636f81b0c95a26df8dbcf16f0d788d12585f0154c3d64545086e7095a6eb3fa3c5e9b9e610d45ed3cb35eac4d7fd868210bbe4217dacbedde9a09fe393901df

  • SSDEEP

    1536:zPWtHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQty9/yj1gi:zPWtHF8hASyRxvhTzXPvCbW2Uy9/E

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcf3c61426860a4cc128ab3a5408db291b9a57ad97b6c961efe53fdade34a47e.exe
    "C:\Users\Admin\AppData\Local\Temp\dcf3c61426860a4cc128ab3a5408db291b9a57ad97b6c961efe53fdade34a47e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\efcz_yly.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3788
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA086.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1E8F1806E875446B8069ED8544F90AD.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4324
    • C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\dcf3c61426860a4cc128ab3a5408db291b9a57ad97b6c961efe53fdade34a47e.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA086.tmp

    Filesize

    1KB

    MD5

    a9f6936e036a2e80f8b1cc1479fe998f

    SHA1

    77c67e13ef1971cc42aaff71be186f11c637aa84

    SHA256

    456053ef7402ffe8b02ed7ec4f189988f2d03347b27c728a029c01e55ca38dd8

    SHA512

    a02f5b38dbcf98218b8203292d6a388b81aea8d072347903264926295a73f8c1c5a3ca87b8051b4d55b2ec49a29843c098227cf02c69efa4e0c6c137d2dac7f7

  • C:\Users\Admin\AppData\Local\Temp\efcz_yly.0.vb

    Filesize

    15KB

    MD5

    0585b7da0515d907213506cbea0174ee

    SHA1

    289cd8392a9bcc9ffb2690423cebf8d5424ce068

    SHA256

    9ac4644b18c0c38da88700800597eb31659786a285dd6224a9a5d4b7a15e1b85

    SHA512

    4ab477d469ddfa6b683e847b4e545c796a2fa175d4d548284bf9cfb1643e2558033b6169d47a0e9dcdef741450d126564b459ada001a631c2dd65cc30af3af7c

  • C:\Users\Admin\AppData\Local\Temp\efcz_yly.cmdline

    Filesize

    266B

    MD5

    0ee5207faff0a22f3ef24181efdfbb7e

    SHA1

    4e6f685a877664ba6ba87445526595f5f5e0ff3b

    SHA256

    9e8b79b70c28e607e821df764bef4cd0be29b0f1927ea5a52ba137c596a8a94f

    SHA512

    4172891b5527749bb0a0362d87355fa365e237b0c87ead5a5e2b954d6d54ff68f06b1f075b3cec476ea87412e0da85ee3c2aa97791ebf292510a7c4a1290a9d5

  • C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe

    Filesize

    78KB

    MD5

    1fbc13ef47e86c17b8ba5fde9ad07805

    SHA1

    0adf97262fc0c326d843b0e56f1b0ef55199b382

    SHA256

    d9d43aaed4afdebd47229b5a932c30698c82849a964aff53c60c2b8468303287

    SHA512

    0df21dc4c1973351d15d671b4a3323f28dc8b1e8dffbd2e8f6d4a13065c73337538cc6060bdeeb4fc74f81d4fd816c33057b2a7f1af2ced05b22a4a5f51953f9

  • C:\Users\Admin\AppData\Local\Temp\vbc1E8F1806E875446B8069ED8544F90AD.TMP

    Filesize

    660B

    MD5

    eca07a75b2ef93d5e32a656d0f573db2

    SHA1

    ec22e3bcff4b85928f2d1b5cd2c05ef304a7170d

    SHA256

    d977b636abc1ec8c3a3fa19786ad0733e51e80222254bc4eda893953b594dd40

    SHA512

    fe980821fd68fe0833078da1478bffb7bc4af2e56c2204fb6a9101905eea3a7fdf9d44e7948af13b0804a035617fa39be3b1fd69c8904cace121d5060168cb80

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/3056-25-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-23-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-24-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-27-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-28-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-29-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3788-18-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3788-9-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4972-0-0x0000000075422000-0x0000000075423000-memory.dmp

    Filesize

    4KB

  • memory/4972-22-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4972-1-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4972-2-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB