Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
374c000706465fddc62a3e19ff6b7610N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
374c000706465fddc62a3e19ff6b7610N.exe
Resource
win10v2004-20240802-en
General
-
Target
374c000706465fddc62a3e19ff6b7610N.exe
-
Size
78KB
-
MD5
374c000706465fddc62a3e19ff6b7610
-
SHA1
e2051a7f0d61fff84dcc7cd2b7c40b9cd9e7123f
-
SHA256
fd182f785a41411f209848aa308e4db000a0844c8fe5cb86f06bdfc017b6c5c1
-
SHA512
6e05b4b0e6d8f9cc590e243cef9eb2a55d164a1d45fe5214d407b065b5f9b28010c290806c4a40a9f722b632e54f255f82ec04febc4a4d9f9643385f598e908c
-
SSDEEP
1536:uOPWV5jSQvZv0kH9gDDtWzYCnJPeoYrGQtN609/f182:9PWV5jSQl0Y9MDYrm779/h
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2556 tmpF96C.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2164 374c000706465fddc62a3e19ff6b7610N.exe 2164 374c000706465fddc62a3e19ff6b7610N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmpF96C.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 374c000706465fddc62a3e19ff6b7610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpF96C.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2164 374c000706465fddc62a3e19ff6b7610N.exe Token: SeDebugPrivilege 2556 tmpF96C.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2748 2164 374c000706465fddc62a3e19ff6b7610N.exe 30 PID 2164 wrote to memory of 2748 2164 374c000706465fddc62a3e19ff6b7610N.exe 30 PID 2164 wrote to memory of 2748 2164 374c000706465fddc62a3e19ff6b7610N.exe 30 PID 2164 wrote to memory of 2748 2164 374c000706465fddc62a3e19ff6b7610N.exe 30 PID 2748 wrote to memory of 2768 2748 vbc.exe 32 PID 2748 wrote to memory of 2768 2748 vbc.exe 32 PID 2748 wrote to memory of 2768 2748 vbc.exe 32 PID 2748 wrote to memory of 2768 2748 vbc.exe 32 PID 2164 wrote to memory of 2556 2164 374c000706465fddc62a3e19ff6b7610N.exe 33 PID 2164 wrote to memory of 2556 2164 374c000706465fddc62a3e19ff6b7610N.exe 33 PID 2164 wrote to memory of 2556 2164 374c000706465fddc62a3e19ff6b7610N.exe 33 PID 2164 wrote to memory of 2556 2164 374c000706465fddc62a3e19ff6b7610N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\374c000706465fddc62a3e19ff6b7610N.exe"C:\Users\Admin\AppData\Local\Temp\374c000706465fddc62a3e19ff6b7610N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e_qkawtw.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFB8F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB8E.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpF96C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF96C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\374c000706465fddc62a3e19ff6b7610N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5804cb44543f46192f05cbc46a98b27a8
SHA1961a6dd14bd4d9da74e13d5aae2142ca096ac78f
SHA256ed07f8ea40e4dcbb8b5bfe61b4a2691772a2cb2f671477044cb3c96f423682aa
SHA5124e570cb63f04ba31dfcdc433ca0072a936603793a0b1b9f81285ad2e8a6538044162b823b0e0bdb6372a32a8c4e410ac6fb044c5b0dedb1dfb50e77389358e76
-
Filesize
14KB
MD5cc90eaff73054162bf164b3852794c9d
SHA13142e77e06eee600c9c5c45affdb9afcfeaa7023
SHA25665843ca69b182f03345687e23da3ee184f881800327e6bd678784dcf72547f77
SHA51207f569c11771711b3251277a513b7c1a05f8791186a4aa370c5f43eeb2e56cc68f7e9494eac0c366124130713e7a19f29ab1f3b437c1b49053a17466d4103ac4
-
Filesize
266B
MD53f065a2fda2689540e0b69e8912285d2
SHA1c4680c26dafcdb18bb8d818b5788fbb986769d59
SHA256d93d418f75591999cfab7e70c1125d9b5b36f729a65990c84adcd2f5f127b89b
SHA512ce7ed152a1a98c33310fa143aa586583ce3775c2f1ce7ace56d5a8cea9f0742688181058da0411fb00e245546d0e3a0f7d83b1755fd182c4de0fb16b310333cc
-
Filesize
78KB
MD5ea7734c7967f81de8067254bcbbfa60b
SHA1968d1fa612bd745fcd5910ab4cff433f308d004c
SHA256db156dfd5f107082b003c872f0ebb7a96351801190f2a0d8561e92b7c14d3300
SHA512dfe226847c554171b44e2430cf2621290d0e7e2f30387b05116b251a534f72ec3ad22c69167a6a16e77cd8368d3c406138c666b9a9422f2c51c3368c88e0ab06
-
Filesize
660B
MD53eb7c657b8f49f22b7f81a9f429cab1a
SHA128d1134f45a5b2ffa4960b1bb573198d215458a2
SHA256be3363d2f3c477270e4a9f320006adfe9fbe305fdd8367463fde3ae8a483a19b
SHA512a10cdbed3bb7e64bd92067e7eb01b7a6c6d5b8e2f60b141e4c7dfb7d7ae03af69301a56960e4e3010cc0c8c9edd89e9d43d3c8ab71d327db7ecbda7044d3895e
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d