Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 01:47

General

  • Target

    d16e1cf1e23ceffb4b66033aae632221347bf9609cd59d27f4c5cb71e88d8d5aN.exe

  • Size

    78KB

  • MD5

    dbe37ff11b0ead44397a7d7772e7e690

  • SHA1

    efc30dea50753e49ddff52b656f0bc33ad471ad6

  • SHA256

    d16e1cf1e23ceffb4b66033aae632221347bf9609cd59d27f4c5cb71e88d8d5a

  • SHA512

    91b4674c28a064acf677fcbe431f3c5518fffd16849ff86bded3be52476e72bd579bf48c4faffb5b4474802ac81c6a0333c40653701da39d7050d6a9aff95c5a

  • SSDEEP

    1536:7cPWtHY6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtp9/av:IPWtHYI3ZAtWDDILJLovbicqOq3o+npk

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d16e1cf1e23ceffb4b66033aae632221347bf9609cd59d27f4c5cb71e88d8d5aN.exe
    "C:\Users\Admin\AppData\Local\Temp\d16e1cf1e23ceffb4b66033aae632221347bf9609cd59d27f4c5cb71e88d8d5aN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iju_xcxr.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC7E5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8BB7F4272A54CFEBBBA6FCAD1BC2DE2.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5164
    • C:\Users\Admin\AppData\Local\Temp\tmpC6CC.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpC6CC.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d16e1cf1e23ceffb4b66033aae632221347bf9609cd59d27f4c5cb71e88d8d5aN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESC7E5.tmp

    Filesize

    1KB

    MD5

    701c161f2146204662d904cca8d92f4f

    SHA1

    73637fa38e74258dab16f7474dc13fe63e7abb9e

    SHA256

    ceb058aa8e0e47361e0c97e4a1029f539248c1628a83408ad7546164ae13a0f9

    SHA512

    8f8aebd2e55d9385960285ea18f3b18b71bd0bb73b8df2244b13d6c10731868132672177c9bbe7bd436f956e2ab914870167994cf5d7a9dbc1c2b4c3329a4072

  • C:\Users\Admin\AppData\Local\Temp\iju_xcxr.0.vb

    Filesize

    15KB

    MD5

    eb42f8ca2540744ae9a7db49ab87e512

    SHA1

    729abc86d64235679a71e10702ee7349d6982afc

    SHA256

    5f738cee023aee6e4c8619b000b6a45a3b12af048548cbc3ead0193eaa5e2538

    SHA512

    b8736f12efc785f28a5990ba1b77984e30043bcc4fb7d7d4777580743107b516527dc76ceafc8081e98a031c39148c5ef8ca3dd4c896b52178deaa9e9a72eaf6

  • C:\Users\Admin\AppData\Local\Temp\iju_xcxr.cmdline

    Filesize

    266B

    MD5

    5c76637e727f5861828856b98d8d00cb

    SHA1

    ceb8c3497eaf56cfce0e0961303d9cbfe95bfdbc

    SHA256

    d023eb74f045dfafb2e8ecba2e284b18238b313b4a4dd4bde1b8ce095f2f4097

    SHA512

    b0a9c8a06f2d4af0d39d47f5088f95144f58e056c103ae822dfa3893d94012578a61ac37b383bf3feb94bb51cd6963e8e38fa24e34c553d8778c27aa2dcd6765

  • C:\Users\Admin\AppData\Local\Temp\tmpC6CC.tmp.exe

    Filesize

    78KB

    MD5

    5b6e8a048f6b793a5c4bd05a0fc98325

    SHA1

    0aa2c155c9e4ff1c00a32371c9440e7aac4e03ae

    SHA256

    468acc94097cdede3701e09ddf7c9c515cacbec465dfe7705a0a48b36d24075d

    SHA512

    3956e384c37075cdf629627fac64d73b862199915dd4ccb253c172c6fe380610dd2ba9c3e9d3066c8df1924c02b712b4575abf2d64e77a4caca7b8f3aaa1697b

  • C:\Users\Admin\AppData\Local\Temp\vbc8BB7F4272A54CFEBBBA6FCAD1BC2DE2.TMP

    Filesize

    660B

    MD5

    e37b1628eb08c0d30107e9927ac26eec

    SHA1

    e9cee998dcb34534dc98031e61df0dd1f2f88182

    SHA256

    c94849c6f3b0dc8ef64de62181840b98182d399d5f4daf3cea1d74dc100c6515

    SHA512

    3cd08bb0a8c3fb22029a3bea1b761a6063bab24f364a8e1f3ec4742e7bb0a63b3c76b18da1571696e01ff79dd8f7d7d891f68b34d0e3e17ad49d8af530260b0a

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/1276-1-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/1276-2-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/1276-0-0x00000000748C2000-0x00000000748C3000-memory.dmp

    Filesize

    4KB

  • memory/1276-22-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4128-8-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4128-18-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/5532-23-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/5532-25-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/5532-24-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/5532-26-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/5532-27-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/5532-28-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB