Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe
Resource
win10v2004-20240802-en
General
-
Target
aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe
-
Size
78KB
-
MD5
41677bdefef313495032aff1edb2bec0
-
SHA1
000c09f9fe00e6fe06ce1dbbd1f4ddaf5c74de40
-
SHA256
aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015b
-
SHA512
79f4ce170da001bbb07db78bb2028ebfcf8b04a468f930dd8c972e3ee60e2df30bc5b9a95618f29c2f20c5ad2fe37b422d5cd004eee5c3a44e452fa0e18e4f6e
-
SSDEEP
1536:ZRCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtea9/b1Ij:ZRCHF8hASyRxvhTzXPvCbW2Uea9/0
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe -
Executes dropped EXE 1 IoCs
pid Process 4444 tmpA27A.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpA27A.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA27A.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 516 aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe Token: SeDebugPrivilege 4444 tmpA27A.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 516 wrote to memory of 2356 516 aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe 82 PID 516 wrote to memory of 2356 516 aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe 82 PID 516 wrote to memory of 2356 516 aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe 82 PID 2356 wrote to memory of 3880 2356 vbc.exe 84 PID 2356 wrote to memory of 3880 2356 vbc.exe 84 PID 2356 wrote to memory of 3880 2356 vbc.exe 84 PID 516 wrote to memory of 4444 516 aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe 85 PID 516 wrote to memory of 4444 516 aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe 85 PID 516 wrote to memory of 4444 516 aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe"C:\Users\Admin\AppData\Local\Temp\aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4bnfmspx.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA4DB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEBBE59E3A0C4CBC9584DFB976E7B79E.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA27A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA27A.tmp.exe" C:\Users\Admin\AppData\Local\Temp\aacd49a99622779c5ce46c7682eb9404da1ae2aee095934fcc1be833d670015bN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5069225f4e15560175d8898371d4793ed
SHA1af5178fbe32e0360a50051f86bf29b797ac4940b
SHA25660b5e8dc79333193eb925781b410c10ffcf0d786c2fadbe15ac0a4b83f073bd6
SHA5126ad6bad5ce4995651d48148a363d0e226ce585840146ebdc8267f29301145eb83d1186bc8a6c3d2aa7aef97fc793b9dee4b575c6a96dfb2c6b90c211c9667d73
-
Filesize
266B
MD56f015cce0f489f884295b3df0e38f966
SHA1907e009ba4fad16dd3a82ecdc6a74567d55fc72b
SHA256bce95859f5befb3ba1774d5f2b82fd134b808144d2bb8c3ae9663d2242269b6d
SHA512976cdb53995eff5af93a521d9541b075ccc5e25c32e193c5e193b732c3e6f4e084e966d7eb35299b5909441cf8aad558c6588eea4d616dc11e2223a832e9f6cb
-
Filesize
1KB
MD5273abd58659fe3c694c94eee3ee24284
SHA12490f0a0ade856316590b23b98592c3f275a46e7
SHA256862921fd9991c148c84506636b6ac6c661f5ba5807b0ebc402e7568d6fbe3ae5
SHA5128eff6cb01e842ad5139954266b424fc7f978d1be3743a332420df2127906c9cd30a53c8e80ac55bb083cd1eb40a0c66ff47d838cdf1b218805c78b8f113a7274
-
Filesize
78KB
MD5912f5743f097f3406e302f30a7ced4ee
SHA128b2982264037278415855f2fc683dc9ffd15c25
SHA256389bfce1a2c9aadff2f4f529d3f96840e8772a9b20de3d169627efc4f1b2e279
SHA512a2aed936525ab87ba31ab09ee319fe597c52ad4efb6f18d054792fc60d51aec20e0b199ac5fcddfc0566a55227a7b3f13a23378f1a5642b19dda0b30c78f99da
-
Filesize
660B
MD5ad51f5ec73a85a29975f4f1e4977b852
SHA1714fb6293ad1fb5c53b9f45b2435e3f6bb1a7eb0
SHA256b7afed76fc45aa6763de027a80d7a04ddd99e2b31c2c5dcb443eb9928982a66f
SHA512f8ac28992fd7869a6741ca47edb1964d48ee623583b2f350dc3c7f66019bcc61a1a0ede347467ed41ee654aba80a139c096e864eb0c59d8af7f22900541db9d4
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c