Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe
Resource
win10v2004-20240910-en
General
-
Target
c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe
-
Size
78KB
-
MD5
9a201d92f825795b6af400ba8339eb60
-
SHA1
b0c7e362c143f9c09927b53a055a9b3a53fca320
-
SHA256
c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4
-
SHA512
3a29479e017b59c5d8e90665c76fbea39dd0ca0ea3e4bbcaac38d61019a3e00a956f84f70a81c19d51af6f572e419fa8d615588c606c4bf80dc4992c914a7c19
-
SSDEEP
1536:fPWV5jS4vZv0kH9gDDtWzYCnJPeoYrGQty6i9/UP1A3:fPWV5jS4l0Y9MDYrm7q9/UM
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe -
Executes dropped EXE 1 IoCs
pid Process 4516 tmp5A60.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmp5A60.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp5A60.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 636 c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe Token: SeDebugPrivilege 4516 tmp5A60.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 636 wrote to memory of 4088 636 c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe 88 PID 636 wrote to memory of 4088 636 c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe 88 PID 636 wrote to memory of 4088 636 c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe 88 PID 4088 wrote to memory of 2664 4088 vbc.exe 91 PID 4088 wrote to memory of 2664 4088 vbc.exe 91 PID 4088 wrote to memory of 2664 4088 vbc.exe 91 PID 636 wrote to memory of 4516 636 c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe 92 PID 636 wrote to memory of 4516 636 c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe 92 PID 636 wrote to memory of 4516 636 c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe"C:\Users\Admin\AppData\Local\Temp\c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fxjcklzr.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5B98.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA5806FB167B74AEE9A51A17103B1687.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5A60.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5A60.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c8b6d9a3cfbd73dd39b8ec843de7f6de4972ea8e487072e07136351fad731ba4N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD507f8dc7c609430cf0af513a5c0f9486c
SHA1267bde791cfc3d53af63f593d27e844f0e08a256
SHA25620e3a3321c5bb285e0f3129811096e1435e0501d0f7321f59fd744115e5a4437
SHA51265d983a03f99962ada6576eeaf1ff4dccae951e99b031c9b40abe54ec128450d0cedc0e6c863163f4485d5d55f7aebd9aad9fbdb73f5dfa7c43b3b8e029b4e0c
-
Filesize
14KB
MD5f5203efb38f2a2eeaa5f54166c3e96bc
SHA1d99c4371a4bb80d9a315a040d3bf4a0353003e99
SHA256334b2fa2e56a3b173ba7e456f2005cdd09b6e7f64d79119a02b22840dd2dc1c1
SHA512771790d7d8ebd9794a37144e21eaeb10fca458850874bd69162af662329fb448c5d9483bab4bf90d94b4957249e255a42887b8601d6fb9e13a9676fa1ed9abf7
-
Filesize
266B
MD55209c10ff913073fabe3b5c0742dc54a
SHA1e717e6263bd6e7be17830aeb858375a8dfd4721f
SHA256ef204b685b6eabece172c2dbca25e7463dc58a6174957e49869764f7dab7b44a
SHA5124d93459b7a374c61870dc12048d6cb6bd4efdfe2673a711a229a2c6e2098d979e0813642a5fa1de5c95130cc0b540d5b6390b5d7ddf8712e21fa88a10d1c932c
-
Filesize
78KB
MD5cf24a7ed000acc4539b224bd45862aba
SHA1b58af9b4f802090f997f6b1d6110a5dfba2a6be7
SHA25652a072d5b34ac6e8b1fab68f85493907b52871b34d0c925f7beddca57d0c125a
SHA512cc434ce10aec75cdea78144eece3a2914a6193162bff6b41f534fbcf854138be77966f1bcb376459069427765bbd958774d46bb1ee6844a1de78100e6c29d578
-
Filesize
660B
MD53e4022aa017dcb0cdd358f8097eee0ea
SHA1e66d615db939578873cb5ef2ec59b6cd4ced1678
SHA2565a9e2c3a238cd82bc4b9957bcf59c21454f69e1070358051a1cd961578d97071
SHA512360cfa13149bdec61322e43b76bfcdfb4b95db724e3594b134791822784d340ef0018b31dd01fc6cde191e304f8fb77e575733b8abca6e87ff29a031ccf2f9b6
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d