Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 12:49

General

  • Target

    efbb9246c8d0e636b6e96bb2d78f1410N.exe

  • Size

    78KB

  • MD5

    efbb9246c8d0e636b6e96bb2d78f1410

  • SHA1

    788239aaa92f7575a5545eaac68eebc35da86234

  • SHA256

    091fb76596ddbb676cb06568ca3c5a750ef225f514fd592f095e0530d709b1b2

  • SHA512

    85e5910a9d2596bd91d2a083b0a61686c737a9152ca667b5cb57702566629b73411c9440c3a80cb122922f25ce7e59d4e4685fa617c1ed8e6ecf00fa93dc6ec0

  • SSDEEP

    1536:TRCHFo6M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtwt9/Oi1/B:TRCHFon3xSyRxvY3md+dWWZywt9/X

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efbb9246c8d0e636b6e96bb2d78f1410N.exe
    "C:\Users\Admin\AppData\Local\Temp\efbb9246c8d0e636b6e96bb2d78f1410N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wzqhtzph.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES98A6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4B708E0FC87E4CB5A920DCC8D641238D.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4504
    • C:\Users\Admin\AppData\Local\Temp\tmp97AC.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp97AC.tmp.exe" C:\Users\Admin\AppData\Local\Temp\efbb9246c8d0e636b6e96bb2d78f1410N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES98A6.tmp

    Filesize

    1KB

    MD5

    e62d9d3d9983e3e63166a6bae1f54852

    SHA1

    484fc08a25bb4db0b9a8e857dcf85f61c28fed13

    SHA256

    42cb1f1b9ace0e915bbab45f74ebc7a47047575e956ee3310fcf1a8fec20d71c

    SHA512

    a7fc2dd21e349b515fc88fe18edc6d62a787a77fd5d5a65b2447ca64d05809a7a4eccd20bc40f3fbdefaf23b1c3907c684ef50e41f97dbc07ddae3137af83784

  • C:\Users\Admin\AppData\Local\Temp\tmp97AC.tmp.exe

    Filesize

    78KB

    MD5

    cb82fc5e2fd179502d117b068332a3a8

    SHA1

    4c3b22f0d976ccad0818270d0c7728d3e112dc8b

    SHA256

    c784c3c81847ec76d213665fefe292542b4e1c267635eafd2c7c040423ef2af5

    SHA512

    638614688581fb61466a78d60dedac7219cf76126c2e18d72fe73155639acafef99f2a1d93b3320b35f4500c1368d186a032bb213fb77672dfc0d3dc2468c792

  • C:\Users\Admin\AppData\Local\Temp\vbc4B708E0FC87E4CB5A920DCC8D641238D.TMP

    Filesize

    660B

    MD5

    efec14fa0c86aa155f5531e904fd5454

    SHA1

    a07d9d0f827f339432a1d16b369b2db658fff805

    SHA256

    40785d77c4cd3bde317cc5662484674c085ebc8ea6b7e5f92659bcda5a101789

    SHA512

    3e2fe0d99c83522c157c6a65306b071aaf6cdbd774aa3685dd9af75377cdc64f9eacb8ab523d4038a0e26a8f893ae0c7b6d1eaefba4670ca7814b66c4bf6d0d9

  • C:\Users\Admin\AppData\Local\Temp\wzqhtzph.0.vb

    Filesize

    15KB

    MD5

    5366eff170b807ce3415c8fed4b981e6

    SHA1

    c1a4fe03ddeb202a5d446f997d62cf9c6e4652ad

    SHA256

    a7a01607dd6ea059a702122cdcdb3196bed6b00f301f49be3efcf9b2195f9fff

    SHA512

    07e7a02a835dc1431e540bd94dab102630e3d893386b01989575b9bcad8115e43ffc436cac68c8e9daad19fe8967fa98276a3c1aa37f3a98bde1655d59379bb8

  • C:\Users\Admin\AppData\Local\Temp\wzqhtzph.cmdline

    Filesize

    266B

    MD5

    193043c0435d7e98af4d39868680a195

    SHA1

    b22579ee47418095d9543737c24865ed709937c8

    SHA256

    50411edaca94546dcbd1a05f4aa164b243c62a6fab0198429ec8deb5d77a91d0

    SHA512

    0751c5f424feba31016be6dfd423bee6a7bddea1ee0984da64ec223da8751e5343a450cdc93dc5bce1161b9079a453f857e38bf9d502dfef2840f42bcb5f9fbd

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/1176-18-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-9-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-23-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-24-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-26-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-27-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-28-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-29-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-30-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/3260-2-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/3260-1-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB

  • memory/3260-0-0x00000000753C2000-0x00000000753C3000-memory.dmp

    Filesize

    4KB

  • memory/3260-22-0x00000000753C0000-0x0000000075971000-memory.dmp

    Filesize

    5.7MB