Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 13:33

General

  • Target

    b47a657e255ad46a538867218bf63820N.exe

  • Size

    78KB

  • MD5

    b47a657e255ad46a538867218bf63820

  • SHA1

    8a045dacc1ff2dab0e45859f7845e4e1f6b9fcbb

  • SHA256

    4fd10fb5a263b5173a4564997ea2bfc8809d55dc48428285df5c6185d75c9233

  • SHA512

    3a53a7efb5fedafa31c4ce55ddcb8582e7826780cc757b1707e60b447ffa5dec5004ebb259c20cf881cf61a3f34d04414b12b051eb660f1a86701ed2533883bb

  • SSDEEP

    1536:ePWtHY6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN9/iA1LYj:ePWtHYnhASyRxvhTzXPvCbW2UN9/in

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b47a657e255ad46a538867218bf63820N.exe
    "C:\Users\Admin\AppData\Local\Temp\b47a657e255ad46a538867218bf63820N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vix_4u1j.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES685F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc62AE0DB57664452686B82F938A3683B.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3948
    • C:\Users\Admin\AppData\Local\Temp\tmp6765.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp6765.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b47a657e255ad46a538867218bf63820N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES685F.tmp

    Filesize

    1KB

    MD5

    ad7e0a2608ec66c5b412634c8bb98148

    SHA1

    cd6cff36cf2625f844b7db148166fde062de0fea

    SHA256

    9d8df3fc0f36cc4bc86611d98bda561f3338fbb9b538b6df565b59c61ec3cae7

    SHA512

    b821c1b3f977efc29f9766ca5e9572554e6307c3df7a557a363a4a5d172ae2fb41724b0e7c132be8e1613c3dfaa581797262fe8a13ad6c6394a42ea15bab3ba7

  • C:\Users\Admin\AppData\Local\Temp\tmp6765.tmp.exe

    Filesize

    78KB

    MD5

    f16874186399086a0f0161d2afb195cf

    SHA1

    2a0c195655f9cfc153fdb17ab7843b612b5abb5b

    SHA256

    7c71607c65bd885a142ad01f2f3b8dea61baf3817aa0cb1cf3a6497343ee9c54

    SHA512

    1beb37f783f0adc5ba2d40d76a194e64d2d0a6def5d9e2bcc08ffd57601bd9af19fc4c7e0146920961cd375e5587715e75b5ce999d44e9a21215d8c7c632c2b4

  • C:\Users\Admin\AppData\Local\Temp\vbc62AE0DB57664452686B82F938A3683B.TMP

    Filesize

    660B

    MD5

    7c10346fa1c43573cc08b20d37179d0b

    SHA1

    a8deb731f977b70213c6923bd65fda7ba1f619b1

    SHA256

    624ae2845f39432562fb9aabfddcbfabe5d836cdf04eea8f947611f1a5afd615

    SHA512

    8e015b3d7cff1e50a7602871ee18b48e309dcbe81ae4206ad1dd3c2d2455dd49b64eadb7d9234836df1d602a322ce5f19339d201f30bf13c81116cb73d4f15e0

  • C:\Users\Admin\AppData\Local\Temp\vix_4u1j.0.vb

    Filesize

    15KB

    MD5

    999c5c398adac84e97ca9e615c9df886

    SHA1

    8792154970d7cfedc9f49ab81469fa84b723949c

    SHA256

    82cdebc700e684fb4e6d05999fe2369885eb3b558728e9e2ddffc929a90397f7

    SHA512

    7208ae483467d102b504b1c8a061c46749ef080b27e86e22ba114671e1e0fdb30cb2f7c32f98440554b91566cc71744a8e15501e72b1845ca4c84dbc6bb3e2ce

  • C:\Users\Admin\AppData\Local\Temp\vix_4u1j.cmdline

    Filesize

    266B

    MD5

    88fba15237794c7c9d5c9228cc587940

    SHA1

    a8e43cba2c9a69ba7c54484043b7f73627050145

    SHA256

    c673b504b8c0279667631422314d0be39e8e5ef7b6287eef0d8d3ddbcef77010

    SHA512

    f0475d86df3d9d53999d407e492cf4ad892fc18c33d6e2b2d49885d7dce429abebb3ceed87b298ddf0eeadbc537ba4eca1c5149c73941b875c42187cf6584a62

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2016-9-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2016-18-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-23-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-24-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-25-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-27-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-28-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-29-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3148-0-0x0000000075032000-0x0000000075033000-memory.dmp

    Filesize

    4KB

  • memory/3148-2-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3148-1-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3148-22-0x0000000075030000-0x00000000755E1000-memory.dmp

    Filesize

    5.7MB