Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 22:05

General

  • Target

    ede2b6db8a423a976010c43eaba72e3f0e7d8cdcb47e821d034f311dac70045aN.exe

  • Size

    78KB

  • MD5

    2443df3e6af679ed72fc57b07e1240f0

  • SHA1

    fe5e60b133c9f46cb6d51304d733b7a9817bbd1f

  • SHA256

    ede2b6db8a423a976010c43eaba72e3f0e7d8cdcb47e821d034f311dac70045a

  • SHA512

    0974a4e1c100839d1bf95544ce0ae49412fa0af5c921921406fc5526eb1cebed29c0501e3a0d3ee642d15005406f84c1cab682479a145974b28356cbc0108ac2

  • SSDEEP

    1536:7HFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtf9/G1fd:7HFonhASyRxvhTzXPvCbW2Uf9/G

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ede2b6db8a423a976010c43eaba72e3f0e7d8cdcb47e821d034f311dac70045aN.exe
    "C:\Users\Admin\AppData\Local\Temp\ede2b6db8a423a976010c43eaba72e3f0e7d8cdcb47e821d034f311dac70045aN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\thpovoci.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3160
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB536.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDFB692C968B94028A4FA5DADFE8B6285.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2932
    • C:\Users\Admin\AppData\Local\Temp\tmpB42D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpB42D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ede2b6db8a423a976010c43eaba72e3f0e7d8cdcb47e821d034f311dac70045aN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESB536.tmp

    Filesize

    1KB

    MD5

    f4786b4c5eb33cc8c36963c9cf7596b0

    SHA1

    4c6fe78742a97b0deef9d0119509431d69bd7954

    SHA256

    f41571e272ffe0ce8d01c40f0ddf666b9ba4cf4ba620ee5c258aae77af969cc2

    SHA512

    02a9406ab8174848cf82b11d403588c293c9ea579dada59ff6ea2ce78ffd8f9ba1dbc5ed4eb91500843a04e804b6f3c93f0ee066dd89cbb61690f2bc7ad330a3

  • C:\Users\Admin\AppData\Local\Temp\thpovoci.0.vb

    Filesize

    15KB

    MD5

    59456e6d7761f07e88510955c69a609f

    SHA1

    eb9da417e51e19a01b011c38a416d1f9e1c914d5

    SHA256

    04c37b58bf746d32f0bdff9c4f26b4ca357c535abb82d0149f62bc53b54d6251

    SHA512

    6eaaed1ac3ac34e1dd0b3196cd2d7856f709809fc9a5824f690bfcf7254f0f6484c8b187c864a9661ac2420178f734a63974fa1d0628bab9b2f6ed26ad3dbfd7

  • C:\Users\Admin\AppData\Local\Temp\thpovoci.cmdline

    Filesize

    266B

    MD5

    54b76b0c223c7f1d4556cd627e6ac750

    SHA1

    47eaccdc4353914edda95ed51a9ea5c2f4314d45

    SHA256

    7845b73a58ccb75ff56da931764b3c697bb8dcff4753f50ba405262a0ded5fff

    SHA512

    d1329cc15a3e52de3fab4d7467cc43d49d938c44fdc81fb3439feb45ea0a2ac6196fbed89a8e3abcdca0ffeb6b9e620a9b90a245121d225663fa666348b44261

  • C:\Users\Admin\AppData\Local\Temp\tmpB42D.tmp.exe

    Filesize

    78KB

    MD5

    841dc8964ae505571b46b2c93af6f8a6

    SHA1

    caab597149c8adab2472e91636b87e16daf64b1e

    SHA256

    bfa4bb64e4b3a04f137f83ad1314b520f86aa94eed858069243f6033e25913c3

    SHA512

    1510981d0344fafb0221786af3372e9a78a08efc6454c53d57acbf0a1e91e157d568f6638a239dfdf5af272287cd00af9f2cc83c15f6575ad70d2c9e8c2a4bf1

  • C:\Users\Admin\AppData\Local\Temp\vbcDFB692C968B94028A4FA5DADFE8B6285.TMP

    Filesize

    660B

    MD5

    dcd444b10253e4214f56bc4fb4f40e05

    SHA1

    06cc64e9b99e03f1381265779ca698a34a93d7bd

    SHA256

    e1ce5a27592c0faddd9f1953ff96a34279e35f783eb89d38515231e81e6fa064

    SHA512

    68145d10c4d9e4d7df7ce1e429d0f86982594a45e4521b03d7fd67cc1b86081135a220a5dbb27388834c252286b556230154fab9ba025dbe0ac91372272e625f

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1960-0-0x0000000075532000-0x0000000075533000-memory.dmp

    Filesize

    4KB

  • memory/1960-2-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1960-1-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1960-22-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-23-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-24-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-25-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-27-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-28-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-29-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-18-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-9-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB