Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 03:10

General

  • Target

    a2287523477ae7d89d7c4ef21380cfd6031bf94eb068883f842ed37d21acd855.exe

  • Size

    78KB

  • MD5

    592c6d0266b3496ba78464569efa9e7b

  • SHA1

    8d70b2a061c3d987b27ea42ecb798cdce8314d6d

  • SHA256

    a2287523477ae7d89d7c4ef21380cfd6031bf94eb068883f842ed37d21acd855

  • SHA512

    ff0402a4dc81575cc9cc02696669579aa93af31d88743aa87a43756a5ab0f907f6287ef7cbfb196712f2739c9a9a31fec9e8780ad3a7311a2fa165b5bb50840f

  • SSDEEP

    1536:HHHM7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQto9/C18u:HHshASyRxvhTzXPvCbW2Uo9/E

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2287523477ae7d89d7c4ef21380cfd6031bf94eb068883f842ed37d21acd855.exe
    "C:\Users\Admin\AppData\Local\Temp\a2287523477ae7d89d7c4ef21380cfd6031bf94eb068883f842ed37d21acd855.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rwdn37p_.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES316B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc84B62165C00C4CBDA2954B74A2B99581.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3828
    • C:\Users\Admin\AppData\Local\Temp\tmp2EFA.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp2EFA.tmp.exe" C:\Users\Admin\AppData\Local\Temp\a2287523477ae7d89d7c4ef21380cfd6031bf94eb068883f842ed37d21acd855.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2248
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4088,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4388 /prefetch:8
    1⤵
      PID:4228

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES316B.tmp

      Filesize

      1KB

      MD5

      42ba0d6809eac1ac93d4af42c54950d9

      SHA1

      5cbc699a7c584022ae6db5a55dca9ad563b09370

      SHA256

      b3ed3f21fc5719b9b5fb1f746cb580fe2f155c9646ea476a7df8587d0d05091b

      SHA512

      34e5685db2f19ceae87141b07e4206e7197a919a8f0ebd51c82d71e7be3c138086ecbb18d2ec6f8bfce6a414756f55a74e863b6f7dd4a71fb75aab2ff574b142

    • C:\Users\Admin\AppData\Local\Temp\rwdn37p_.0.vb

      Filesize

      15KB

      MD5

      645a67c3c68aa91caeec561ab987861a

      SHA1

      cb7eebf13fc4916f46140a3bb1a3746aec8a51de

      SHA256

      a8dae9d75e3127df3c452e866c0d181d5a377ba24a15ffc95509c86b03cc59c8

      SHA512

      11deca14ca80e98faed5fbc3c8feaf929bd60314286fad6afb1646c0e9aa775a824d7517c5e32b725b147e853225e75a1a1b30aa812bbb20168c2f97d2870ce2

    • C:\Users\Admin\AppData\Local\Temp\rwdn37p_.cmdline

      Filesize

      266B

      MD5

      30f76b7912c983851844d05f46dbed53

      SHA1

      00bfcf43e58d9afd730a084dbc81c76f7d3a7895

      SHA256

      3e3649be6210723731c2365bfd385a074c4ed9b781cc1324ab2a973292171be5

      SHA512

      49e3a9ee5a2c33a67f58e539a61e2e78d32b0c756847a310c1e27231e2edaf6525289a14ac65c85951e416bacd5596fb2407184bcdca98bd70ef530f8259464b

    • C:\Users\Admin\AppData\Local\Temp\tmp2EFA.tmp.exe

      Filesize

      78KB

      MD5

      1379c92649b79eaad7a842600639da66

      SHA1

      c24625e86e2472e38ef48eb6f3a7ffddcf40c257

      SHA256

      748f13c18564d1cd7bdde9cc2dc81024db984ffdfea5c1b0638a56b4e476a001

      SHA512

      5713b220dc21347b2c33853b2efb5bfbe2832603ebbd4c8378141090d71a3096197e1cdb6776147a8ceeadc686e40bb391c220ed8e3afaa812624acb32ff6f32

    • C:\Users\Admin\AppData\Local\Temp\vbc84B62165C00C4CBDA2954B74A2B99581.TMP

      Filesize

      660B

      MD5

      a683241c8746ab40a72de2345cc3a91f

      SHA1

      e7037b5b31d6c579721e7362d0831e6feefbc4e0

      SHA256

      45eacaa6d032423b0235ebbd2cce7d50297f30f49eedb8bc5ae487012e7892fa

      SHA512

      2f4303073779eb585851fa6899e61beaa824648761d4ef6289a5574afb5efc7fff19b43890ae4bb29d6e01f9a0d7eae8754f130f7dd03c2554231e022afc8578

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      8fd8e054ba10661e530e54511658ac20

      SHA1

      72911622012ddf68f95c1e1424894ecb4442e6fd

      SHA256

      822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

      SHA512

      c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

    • memory/1488-18-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/1488-9-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/1740-2-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/1740-1-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/1740-0-0x0000000075182000-0x0000000075183000-memory.dmp

      Filesize

      4KB

    • memory/1740-22-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/2248-23-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/2248-24-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/2248-26-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/2248-27-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB

    • memory/2248-28-0x0000000075180000-0x0000000075731000-memory.dmp

      Filesize

      5.7MB