Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe
Resource
win10v2004-20240802-en
General
-
Target
b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe
-
Size
78KB
-
MD5
91bc40189ed4720fc12f2acecf4d1891
-
SHA1
8800564f56f16384e54b98bebfeb90d10cea65ef
-
SHA256
b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed
-
SHA512
18571e7e72e74a78691f89367a502edfa974b578345574e7527a997ff61c6372096245c7e6b727a726f42991a9947c65c627b1663187e44fb403bd49dda917b6
-
SSDEEP
1536:hXPWV5jSfAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti6H9/c1n1:ZPWV5jSfAtWDDILJLovbicqOq3o+n/9k
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 484 tmpC783.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpC783.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpC783.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe Token: SeDebugPrivilege 484 tmpC783.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2328 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 30 PID 2080 wrote to memory of 2328 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 30 PID 2080 wrote to memory of 2328 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 30 PID 2080 wrote to memory of 2328 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 30 PID 2328 wrote to memory of 2052 2328 vbc.exe 32 PID 2328 wrote to memory of 2052 2328 vbc.exe 32 PID 2328 wrote to memory of 2052 2328 vbc.exe 32 PID 2328 wrote to memory of 2052 2328 vbc.exe 32 PID 2080 wrote to memory of 484 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 33 PID 2080 wrote to memory of 484 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 33 PID 2080 wrote to memory of 484 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 33 PID 2080 wrote to memory of 484 2080 b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe"C:\Users\Admin\AppData\Local\Temp\b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cplxi1of.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC8CC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC8CB.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpC783.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpC783.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b8e7f397929414a5cfc35f04a3448131f80a75b859135b906294197f225a51ed.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54acd7b129461d522d78a621b2c31b563
SHA156398b3bbc0f82ca0fda0d273867db6cde691ac9
SHA2563aeb5a923b59307c1c4e599458686760e4c2c44f7587cd0e7e9897a1c3fc9658
SHA51264ee178c831a31521b8a7e50af0a9e01bf5e3f15afda7dccd12b59d3658d473a6c770e5da848a5d7fec334ac1fcd09b854cfece08a714748aa1869a2ede21e67
-
Filesize
14KB
MD5eac99d8d7a52c288a7547a299862adfb
SHA16e498ff592af1c44f4e8e01ec6791908604f327f
SHA256c00db2a030b193b5b190093521c449b6ef31899dbdcf006c4025b9032ab34adf
SHA5121be5abecacfc88e45fcbeb1354d30741abb331ebc9d61c3de1ab11acc17bc926d7eaa65969d129e79d9147e41e9c048a07a9a4c835b562ce92614519eef31d96
-
Filesize
266B
MD5fb584b3ab26a4f5669f9f26844fd4ed7
SHA1b8f49e0034fa556ad081b87916616d49adb250fe
SHA256e639c94a798b5a58cba28f49fd722b450a093f1def053a3de3e8d1c644cda83a
SHA512423ed2864790c61ca6100aa2e31b410c7e1e88d2f33aa951cdcd2a8b9f3b8839f29a172efdf29c34567a724301aba8bdc50caed58ce06cc38bf36cb1e4a399e1
-
Filesize
78KB
MD5c7bd09a93482eb402050313046e0eccb
SHA180b17a6ab2ffa7b2db517f1878838e6cc28e9aab
SHA256b1339d7aff070cf026033c8f6a297663b6dffc759aa536073a86f3712664e1cd
SHA512bf99f0906743c966228b4eac532d996f7c4e64c42486ed69cfbce9a693a5c759657a7770b02a3aac5da45d574a608f6eb6884592dec00877d6fee85ec75763d3
-
Filesize
660B
MD5232ee4ffcc1346bc1b26c7ecf208b098
SHA1c41842816600d31f1c468374f8ed3053fcda5190
SHA256ea28f259b8d7f916f0b94da2c7cb1a639896c26bbda204d6f6b1ba2c2b6af519
SHA5125140e98c09934bd99fdbfbac1e68f5828d02ee2ad24918fa2273d7eeeda59c6d3b7576048614ee6dc6157d6f845526f4078b737b94c2490e1ebb94d410cd2a29
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c