Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 15:41

General

  • Target

    374c000706465fddc62a3e19ff6b7610N.exe

  • Size

    78KB

  • MD5

    374c000706465fddc62a3e19ff6b7610

  • SHA1

    e2051a7f0d61fff84dcc7cd2b7c40b9cd9e7123f

  • SHA256

    fd182f785a41411f209848aa308e4db000a0844c8fe5cb86f06bdfc017b6c5c1

  • SHA512

    6e05b4b0e6d8f9cc590e243cef9eb2a55d164a1d45fe5214d407b065b5f9b28010c290806c4a40a9f722b632e54f255f82ec04febc4a4d9f9643385f598e908c

  • SSDEEP

    1536:uOPWV5jSQvZv0kH9gDDtWzYCnJPeoYrGQtN609/f182:9PWV5jSQl0Y9MDYrm779/h

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\374c000706465fddc62a3e19ff6b7610N.exe
    "C:\Users\Admin\AppData\Local\Temp\374c000706465fddc62a3e19ff6b7610N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e_qkawtw.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFB8F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB8E.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2768
    • C:\Users\Admin\AppData\Local\Temp\tmpF96C.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpF96C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\374c000706465fddc62a3e19ff6b7610N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESFB8F.tmp

    Filesize

    1KB

    MD5

    804cb44543f46192f05cbc46a98b27a8

    SHA1

    961a6dd14bd4d9da74e13d5aae2142ca096ac78f

    SHA256

    ed07f8ea40e4dcbb8b5bfe61b4a2691772a2cb2f671477044cb3c96f423682aa

    SHA512

    4e570cb63f04ba31dfcdc433ca0072a936603793a0b1b9f81285ad2e8a6538044162b823b0e0bdb6372a32a8c4e410ac6fb044c5b0dedb1dfb50e77389358e76

  • C:\Users\Admin\AppData\Local\Temp\e_qkawtw.0.vb

    Filesize

    14KB

    MD5

    cc90eaff73054162bf164b3852794c9d

    SHA1

    3142e77e06eee600c9c5c45affdb9afcfeaa7023

    SHA256

    65843ca69b182f03345687e23da3ee184f881800327e6bd678784dcf72547f77

    SHA512

    07f569c11771711b3251277a513b7c1a05f8791186a4aa370c5f43eeb2e56cc68f7e9494eac0c366124130713e7a19f29ab1f3b437c1b49053a17466d4103ac4

  • C:\Users\Admin\AppData\Local\Temp\e_qkawtw.cmdline

    Filesize

    266B

    MD5

    3f065a2fda2689540e0b69e8912285d2

    SHA1

    c4680c26dafcdb18bb8d818b5788fbb986769d59

    SHA256

    d93d418f75591999cfab7e70c1125d9b5b36f729a65990c84adcd2f5f127b89b

    SHA512

    ce7ed152a1a98c33310fa143aa586583ce3775c2f1ce7ace56d5a8cea9f0742688181058da0411fb00e245546d0e3a0f7d83b1755fd182c4de0fb16b310333cc

  • C:\Users\Admin\AppData\Local\Temp\tmpF96C.tmp.exe

    Filesize

    78KB

    MD5

    ea7734c7967f81de8067254bcbbfa60b

    SHA1

    968d1fa612bd745fcd5910ab4cff433f308d004c

    SHA256

    db156dfd5f107082b003c872f0ebb7a96351801190f2a0d8561e92b7c14d3300

    SHA512

    dfe226847c554171b44e2430cf2621290d0e7e2f30387b05116b251a534f72ec3ad22c69167a6a16e77cd8368d3c406138c666b9a9422f2c51c3368c88e0ab06

  • C:\Users\Admin\AppData\Local\Temp\vbcFB8E.tmp

    Filesize

    660B

    MD5

    3eb7c657b8f49f22b7f81a9f429cab1a

    SHA1

    28d1134f45a5b2ffa4960b1bb573198d215458a2

    SHA256

    be3363d2f3c477270e4a9f320006adfe9fbe305fdd8367463fde3ae8a483a19b

    SHA512

    a10cdbed3bb7e64bd92067e7eb01b7a6c6d5b8e2f60b141e4c7dfb7d7ae03af69301a56960e4e3010cc0c8c9edd89e9d43d3c8ab71d327db7ecbda7044d3895e

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/2164-0-0x00000000742B1000-0x00000000742B2000-memory.dmp

    Filesize

    4KB

  • memory/2164-1-0x00000000742B0000-0x000000007485B000-memory.dmp

    Filesize

    5.7MB

  • memory/2164-2-0x00000000742B0000-0x000000007485B000-memory.dmp

    Filesize

    5.7MB

  • memory/2164-24-0x00000000742B0000-0x000000007485B000-memory.dmp

    Filesize

    5.7MB

  • memory/2748-8-0x00000000742B0000-0x000000007485B000-memory.dmp

    Filesize

    5.7MB

  • memory/2748-18-0x00000000742B0000-0x000000007485B000-memory.dmp

    Filesize

    5.7MB