Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
30fcafa5b1901662c7380cdd43f66940N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30fcafa5b1901662c7380cdd43f66940N.exe
Resource
win10v2004-20240802-en
General
-
Target
30fcafa5b1901662c7380cdd43f66940N.exe
-
Size
78KB
-
MD5
30fcafa5b1901662c7380cdd43f66940
-
SHA1
d1747e772d9e4bee597650bcb851de40a46bf4f2
-
SHA256
b4e0db7411b309de3782066420b53404d8c982d7a1b7b25393854c314f033fb7
-
SHA512
ef49e07987838e41db6fb5355df19f03a09dffb02c2c30cf5f1350dcd44c458218f970837a8143c22652cecd0d54e820c9c14c48f40bf6ccfc26755944aba99b
-
SSDEEP
1536:yVc55AlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtd6J9/jP1QJ:oc55AtWDDILJLovbicqOq3o+ni9/jO
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 30fcafa5b1901662c7380cdd43f66940N.exe -
Deletes itself 1 IoCs
pid Process 4704 tmp8102.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 4704 tmp8102.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp8102.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp8102.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30fcafa5b1901662c7380cdd43f66940N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2684 30fcafa5b1901662c7380cdd43f66940N.exe Token: SeDebugPrivilege 4704 tmp8102.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2684 wrote to memory of 6136 2684 30fcafa5b1901662c7380cdd43f66940N.exe 92 PID 2684 wrote to memory of 6136 2684 30fcafa5b1901662c7380cdd43f66940N.exe 92 PID 2684 wrote to memory of 6136 2684 30fcafa5b1901662c7380cdd43f66940N.exe 92 PID 6136 wrote to memory of 5656 6136 vbc.exe 95 PID 6136 wrote to memory of 5656 6136 vbc.exe 95 PID 6136 wrote to memory of 5656 6136 vbc.exe 95 PID 2684 wrote to memory of 4704 2684 30fcafa5b1901662c7380cdd43f66940N.exe 96 PID 2684 wrote to memory of 4704 2684 30fcafa5b1901662c7380cdd43f66940N.exe 96 PID 2684 wrote to memory of 4704 2684 30fcafa5b1901662c7380cdd43f66940N.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\30fcafa5b1901662c7380cdd43f66940N.exe"C:\Users\Admin\AppData\Local\Temp\30fcafa5b1901662c7380cdd43f66940N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\d1mh8h4p.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6136 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8299.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc46FF38FC774C43FD81228F68B1352A3.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:5656
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp8102.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8102.tmp.exe" C:\Users\Admin\AppData\Local\Temp\30fcafa5b1901662c7380cdd43f66940N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:81⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD559bc3aa242a24bad90c9a2b320f05194
SHA1758e4c6a728260d04f8a610d916f10ea4832241b
SHA25663d46ca61447a3db88e4f9b68b528477940d9878d1ad55e1d4389f9dbe2375f0
SHA512e508a39971dc872eece2378396ec9a601ff21dad5d0fc2e49ff28b5958617c0bf5a782775d5b6466f9b1c8ecd8a72849b2ac658c02965d2a9bfb749d530d7b59
-
Filesize
14KB
MD5b33e03c4266e57c01967bbdf14271da6
SHA17ead1dfb4c37b77aa0d853950481233c35881af9
SHA256fd247635d0237d12e0a5db83d6fce963c604d7784a88fc4ccdff5e23e95605e4
SHA512372d7ab53871a2b67010122bf4bbb3977cee34da34edf1ca8bbbb5e0fd0dd210d7626aed3f9249e8bed815bd11f161ca944f6bd982515cfa2b682f53bf0ea3b5
-
Filesize
266B
MD546da5552ba3f3af53171a36869d07cee
SHA1d723aef697393205ba8085c3acb6d5f58d98c705
SHA2563e2755da725c02584b77f18452580ba3429a4cd09a06b38f614004791ae3498f
SHA512b25b7a955e491cc1fa1cd79c839b283445b8452b435f00de3addff303fb05a68e3099293a94c4ad166b3b56685e344ef79683fe04cf5c9945f715de01951a710
-
Filesize
78KB
MD579974e16119eb2111aeff03ea80ff6aa
SHA18b0e1076c0f71b2ecb914a437d32bd67d7a96209
SHA2567e30b4fcb653e936db90b14faa0188e90d2e5597aa9af80a14505e64b7f83553
SHA5121ed0dc8547cbc06c975ec3b6260bc193142ab326103b8791a357d2d434b29b87ac95522e7482e0bd3b6dcaf10a5598db370c3106610228026ececde3a4ad0c49
-
Filesize
660B
MD50e29e04db4ea6dbd445a995accf1e9c7
SHA17509aca1971e1714f6ccf538abd4ac0f7e05c7fc
SHA25677314c1a39c8bd5c893c69c5b0a32c750a340b462fe8a2bd29b1aba30b94f49f
SHA512bd608a5f97d244148e608a1510f4e3db82ae347a9fe5469af9e50ca5fda7412d1a5c67ad432c3d59705f9925927620c0920aff4be51949448e228653c6a0eef0
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c