Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 19:16

General

  • Target

    1cfc7bf36f0e17320f0fb8e6e49218683be2ba4780600ff93839eac8f3f8e98c.exe

  • Size

    78KB

  • MD5

    6cb619b009a286f68dfce4171424e880

  • SHA1

    312c3964ff0cf4291a2063a7a047f75fc723b26e

  • SHA256

    1cfc7bf36f0e17320f0fb8e6e49218683be2ba4780600ff93839eac8f3f8e98c

  • SHA512

    5a0398983458f7845197d805259327776a0f97e918243a0c94e2907e13a2574fd42807d4606131ba3326c9b91edf98965dd22fd2ea3a3786cee336c0c21a724d

  • SSDEEP

    1536:dHHM3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtH9/813t:dHs3xSyRxvY3md+dWWZyH9/Y

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cfc7bf36f0e17320f0fb8e6e49218683be2ba4780600ff93839eac8f3f8e98c.exe
    "C:\Users\Admin\AppData\Local\Temp\1cfc7bf36f0e17320f0fb8e6e49218683be2ba4780600ff93839eac8f3f8e98c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\acgfj8_y.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCF80.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCF7F.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1624
    • C:\Users\Admin\AppData\Local\Temp\tmpCE57.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpCE57.tmp.exe" C:\Users\Admin\AppData\Local\Temp\1cfc7bf36f0e17320f0fb8e6e49218683be2ba4780600ff93839eac8f3f8e98c.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESCF80.tmp

    Filesize

    1KB

    MD5

    239a410eb645ca35d5d89939bdc281cd

    SHA1

    ddb3493f682dc8a9cd7699d4aa1bcbcb131f564a

    SHA256

    cdd4410c49b9f4829c9dc28815a47f0024310417d9f060e86f43db893a8a0785

    SHA512

    01717f1898ca3b321652d9d4b02430a27de4b1602477f4641e30839c7d0fdfca5b904f1be32cd90a10ef7da0c73f9b41d0292fb88afa55d1cc5c9734310b91a2

  • C:\Users\Admin\AppData\Local\Temp\acgfj8_y.0.vb

    Filesize

    15KB

    MD5

    2382fd51879755e759ec5b38064b0e10

    SHA1

    14631c79c993af09dc7fa2f9a95e082e5c5d68a2

    SHA256

    c036bea760ae6cbf96f8f38061741fec00a80a0737bc5e799a0918533be27c5c

    SHA512

    92b03317d1c1346e460e65cfe20f82a6c26d842dc4f528cb0b610050676ef44282e4e94076274d22b813f1fc523d8e5a00695cab9f2b86bddbfc145e20478d3d

  • C:\Users\Admin\AppData\Local\Temp\acgfj8_y.cmdline

    Filesize

    266B

    MD5

    e135a8e051f40de837674b2646bbfe27

    SHA1

    374a7cedc4e07b7bdd406e3f178cebb147ea4d77

    SHA256

    834318f41726087d7a8139b485b44b10406d65e14728dfd9f8bb8e449517db4a

    SHA512

    141a0df4762a13614bc0e4b569c4238fcfe1c3cbe28dd4ce84aaa1d227c92c8fa1c36da1ca5a053021342938be6c45513e8012a9a31c6dcd92c6e4c9ae45e853

  • C:\Users\Admin\AppData\Local\Temp\tmpCE57.tmp.exe

    Filesize

    78KB

    MD5

    ac58585c0b0b6a1f2b0712ff85735242

    SHA1

    0446e704fd79e5d5438d3136dd2726bed3d5f227

    SHA256

    83cf7afefd0257b9d41b76248d85363d8e8a4da01f3c7e8c5ef9c8f1e0d62677

    SHA512

    3c36e6d9cb059f86ddcd494ac7922def2e9335e997842040b26e94f4aeeea8b9e4e59674035f0ff2b6baa820bb72a87aae0a2266b41ca3b3577a1139bb86fae6

  • C:\Users\Admin\AppData\Local\Temp\vbcCF7F.tmp

    Filesize

    660B

    MD5

    77a951796c5e1f0746d092346e7dad30

    SHA1

    05272317000df93503571616ca89ef1ac08cc9ab

    SHA256

    37ce0a0769fddefddd058fadea2347d7ed1f6c500dfeaa352a684328fe2113d1

    SHA512

    2dda1ea3f2bf8d0c4d86e9e13262ca0d3ab7838662a35fec5b670a3ea21e13f2844239cdc3f261ae26936e73a836094176aaa537db681e2bf5b2b9ac04267252

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/1220-0-0x00000000748A1000-0x00000000748A2000-memory.dmp

    Filesize

    4KB

  • memory/1220-1-0x00000000748A0000-0x0000000074E4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1220-2-0x00000000748A0000-0x0000000074E4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1220-24-0x00000000748A0000-0x0000000074E4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-8-0x00000000748A0000-0x0000000074E4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-18-0x00000000748A0000-0x0000000074E4B000-memory.dmp

    Filesize

    5.7MB