Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 13:13

General

  • Target

    4f6123bee202f302bada336f2653a387103bdd1fe60ee5bdd7af60096fe09e27N.exe

  • Size

    78KB

  • MD5

    f087f48ca7dbe075208a9857f2da67f0

  • SHA1

    eba1417348a65af6b5c950e8b7c632ecdbf2cd6b

  • SHA256

    4f6123bee202f302bada336f2653a387103bdd1fe60ee5bdd7af60096fe09e27

  • SHA512

    34ae56909de0f66a9b2a7416456970ee5624dfc940958f986a85074c8c9fdcac8d7e5cc6d467279dc6479e3fd4e1d49f6d8591b82688a2395626e327138b8334

  • SSDEEP

    1536:be58fXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQty6g9/0xE21J7:be58/SyRxvhTzXPvCbW2UY9/0

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f6123bee202f302bada336f2653a387103bdd1fe60ee5bdd7af60096fe09e27N.exe
    "C:\Users\Admin\AppData\Local\Temp\4f6123bee202f302bada336f2653a387103bdd1fe60ee5bdd7af60096fe09e27N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yqektupv.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF0E5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF0E4.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2648
    • C:\Users\Admin\AppData\Local\Temp\tmpF019.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpF019.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4f6123bee202f302bada336f2653a387103bdd1fe60ee5bdd7af60096fe09e27N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESF0E5.tmp

    Filesize

    1KB

    MD5

    44c69b1924b1d995fc11e3969d4b30c0

    SHA1

    750321492cb992d3f37bd2f27ba7476bdfe5b4c9

    SHA256

    ce3bbd114786abffc153ae90a0b326356150795c838f46965ca0a21a00785397

    SHA512

    2bbf7626828053b53be06cb24500e12526286ebc272b6ab4346f06c950a67f6943028d55af326ed5f94797e5159c65e95d29efaaf57a5a92c9b618127b32ec50

  • C:\Users\Admin\AppData\Local\Temp\tmpF019.tmp.exe

    Filesize

    78KB

    MD5

    868317c156a30eda7fec73117817930b

    SHA1

    93e9caa291fbecf827f9007cda68f453b9e1acc4

    SHA256

    3228c60b7c19bb4a7a03aeba68609d6fed98a732d762d80257cb25a6be33dda8

    SHA512

    ee28fb7bd95f79ff895496caa058a1254185d258df75dd6863943df298139b998969d115b45baf498a8a30afab4e70da992a3f71e910ddeaf5242ff92c1a5454

  • C:\Users\Admin\AppData\Local\Temp\vbcF0E4.tmp

    Filesize

    660B

    MD5

    e04e31eb0465d3a21a06412bbaac4a63

    SHA1

    75bff5d9a2b5c5840c9c4e8a2fe27097310801bf

    SHA256

    ced5d23f87275145dfaa52fc42a1ef227d57b4006d106bf238a83314def09fcb

    SHA512

    ca5112189e97708f67846e4d814d76452aec444a219c421713973d70403f304b7d8782f1a2f9e32c1f6bfcb7f488c63e74b6954e368276fe4960fedd945f305e

  • C:\Users\Admin\AppData\Local\Temp\yqektupv.0.vb

    Filesize

    14KB

    MD5

    e459f0372f7de5062393b7a199ff8aca

    SHA1

    7a265d2acfe12d792e386a78a2202c871ab11a02

    SHA256

    7baab619e2ff4a437ac3043838a06e94db07e7849a008d0eed1030aa2657df22

    SHA512

    5abfab645df23fbcddb298e48e6b310a373072648e805e42bd85c9b09a9fad2307c0c2571542dc9bb795003e155aee12ce2aae87151e6f26a4faf310f5d944ff

  • C:\Users\Admin\AppData\Local\Temp\yqektupv.cmdline

    Filesize

    266B

    MD5

    df18069598a1330f2ec5f5b4d0d0db9f

    SHA1

    cf6473d72c9ca7d85fff06bf2682a8717ce6eec3

    SHA256

    dfd8560c48949e2d94456d0697a6dae75f05b65cd9d4b69b187cc539dafa6349

    SHA512

    0cf768c7c581170cd1237fca0632b287e067066d6ac25fc58f2abe3771870ffe5c531017934b67123bc49f52f872e81efc6b39a0fa02c8eb1aa38f4fd38f033d

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1600-0-0x0000000074051000-0x0000000074052000-memory.dmp

    Filesize

    4KB

  • memory/1600-1-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1600-2-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1600-24-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2736-8-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2736-18-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB