Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
ba72cbfbd7fefe91a9455555addf1910N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba72cbfbd7fefe91a9455555addf1910N.exe
Resource
win10v2004-20240802-en
General
-
Target
ba72cbfbd7fefe91a9455555addf1910N.exe
-
Size
78KB
-
MD5
ba72cbfbd7fefe91a9455555addf1910
-
SHA1
fec81f8b247b3e4e623f7e764613b26d3cfbb81b
-
SHA256
9bb70b4c36032803e8c25ef55326fad512e8e9d12dbf59830856ecda2272859a
-
SHA512
f2e2a4a24ccc512ce0100ff66640c1c30aae1213f5dfe7cdbf3f19066431efc381e8953d1baa3fbd7fdf751a331bdc073f07243b459b96bf2b6d1787c2355030
-
SSDEEP
1536:kXe5jSAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti6D9/f1iT:Ue5jSAtWDDILJLovbicqOq3o+nr9/K
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2924 tmp9721.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 2520 ba72cbfbd7fefe91a9455555addf1910N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp9721.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9721.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba72cbfbd7fefe91a9455555addf1910N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2520 ba72cbfbd7fefe91a9455555addf1910N.exe Token: SeDebugPrivilege 2924 tmp9721.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2432 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 30 PID 2520 wrote to memory of 2432 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 30 PID 2520 wrote to memory of 2432 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 30 PID 2520 wrote to memory of 2432 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 30 PID 2432 wrote to memory of 2024 2432 vbc.exe 32 PID 2432 wrote to memory of 2024 2432 vbc.exe 32 PID 2432 wrote to memory of 2024 2432 vbc.exe 32 PID 2432 wrote to memory of 2024 2432 vbc.exe 32 PID 2520 wrote to memory of 2924 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 33 PID 2520 wrote to memory of 2924 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 33 PID 2520 wrote to memory of 2924 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 33 PID 2520 wrote to memory of 2924 2520 ba72cbfbd7fefe91a9455555addf1910N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba72cbfbd7fefe91a9455555addf1910N.exe"C:\Users\Admin\AppData\Local\Temp\ba72cbfbd7fefe91a9455555addf1910N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g702xcsi.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9889.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9888.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2024
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9721.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9721.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ba72cbfbd7fefe91a9455555addf1910N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57eb3041e87d7c2483327d25733af5ed8
SHA1487880c79ddf05e69fdbf91debcab15e35e2bb82
SHA2563fda2b37a3a3c9f5e12fbb9eb439bb5091e39ae6875e0b1e9d9ab87d7c03e562
SHA5124360c01f0aeff7d81f6c2a6bc495e4addb9b1062e273b37f080affe183447854a1d3e3643078b6ac4199ccfcd5f3214292d680684d7f4e20aa817e1be19bb4d0
-
Filesize
14KB
MD5faecd43399244f57f98c43e89406e5aa
SHA1b4112190168a3bcb67c5db5972b1ef819c3faae4
SHA2569993c024675bc39718219e88985d3e4ca216197192abea5da70ad723972b0dd6
SHA5122d16af3dca610e31ebba41841eb77a1052b55148b61362feddc980c2db7c533d6ded55f9a4d816cf22f8309da79623b31d5b3f2cc1803769fb8c479b5bc4276e
-
Filesize
266B
MD5646067fd7f02e95e33f03d86f6cb881d
SHA143aa971dd2a959005d67ff1823ce52bbfff914b7
SHA2569928088b408287cdea42ae181d4a7e125c3a1c45690cce9b22ef482aa8a3ebdb
SHA512af65e286e21d21e26cb6ce3e92380b93d5c63006406031fe81990872e51f529c9fe6912867e6cb5e918c9078c7cc3068d40918ce8985df89f5de9a4a105b6028
-
Filesize
78KB
MD593e6d5968a2716324ef8b7d0cd350705
SHA18b5e1e6eb030ce9733b49ed548b1aba35848d9fd
SHA25628c0fb4040d68c12104c816815db51b6e3a0e50d0b67b9cc7afb60c5ae92f859
SHA512433c1801f1809ceab6db4689208dba6faf19650e9005362e70066c085714685aaa798deb3d7c39f68b54ebedb07743461120ccda4ba5bc5ad3eb83995f10d1f9
-
Filesize
660B
MD53a5773e6f04dbdb5a3b58ff393627967
SHA1ed6effeab723edca9f405ea2b2be30b794bac808
SHA256b5b02a40721a2657a586058bd0e219f694aa035f24f3ff94f0766b10bf94554a
SHA5126a7f50a2f5cb5d053727d3de0d0d61ac8486b9e78f220a0414b699ecef953b69e7b70d068e2bbf43257356679296904d0a5b5c7864b1fd5e5a076d3dacba9692
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c