Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 01:59

General

  • Target

    b51d1807c59efbfa842f7cffe61b9c54f412717fb1a535050765da597de5a4b5.exe

  • Size

    78KB

  • MD5

    7aa2823bcc3a1b0c7ae1ac82d041ea66

  • SHA1

    6d361be5ee331611b3f7cd9103843a936cb45a9f

  • SHA256

    b51d1807c59efbfa842f7cffe61b9c54f412717fb1a535050765da597de5a4b5

  • SHA512

    04ed4a212529c90db8876c7828ab876e7ffbcd459120b76811bfecb3a0061c0d8054f33d7115b563e7b4ce23a0e680ae3777e3e0a9ddbfcb4214a3af8f9ea785

  • SSDEEP

    1536:R5jSAXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC67Q9/N01DG:R5jS4SyRxvhTzXPvCbW2UjQ9/x

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b51d1807c59efbfa842f7cffe61b9c54f412717fb1a535050765da597de5a4b5.exe
    "C:\Users\Admin\AppData\Local\Temp\b51d1807c59efbfa842f7cffe61b9c54f412717fb1a535050765da597de5a4b5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\9xww4jpd.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES98D5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE3996553BA58484084CFCBCAD3FEFC6F.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3388
    • C:\Users\Admin\AppData\Local\Temp\tmp979C.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp979C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b51d1807c59efbfa842f7cffe61b9c54f412717fb1a535050765da597de5a4b5.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9xww4jpd.0.vb

    Filesize

    14KB

    MD5

    3962fa3904f1c5669163d44f97d2efc6

    SHA1

    1ac688b7835bc979a344a4476d99ed0049d7bfb0

    SHA256

    7838b9ed0863c382b82560ff481af43250e953eff501d75a7e531cf280f345e3

    SHA512

    3340b78dccd991b821fc243ceb2b1e797ecff4c15cee5cc935ff6b5f1623e23c1614128a69f26c81b480796fb670a81c7dd0e315e563daa205f0b1e4c03ad436

  • C:\Users\Admin\AppData\Local\Temp\9xww4jpd.cmdline

    Filesize

    266B

    MD5

    cca9126727afa239cbecb820504f10b7

    SHA1

    f42a971558fc89d9bc26f41f7bed2e14d775cad6

    SHA256

    2ddfbebf1ed2dc5e1607f9077b7ae358e1ddd75d96f473881c27362c9d6fdbb0

    SHA512

    d5208c013eba23e995eeb1ef8aab8624fbac26a416e2df46ed3bc64e13ee666c7f8ddd8687a7d91069e601e661efea1efa67c8d0701a88c3a1b3726bf06d55fb

  • C:\Users\Admin\AppData\Local\Temp\RES98D5.tmp

    Filesize

    1KB

    MD5

    dc685d7d9c6c4f5d2d3fea3ac95173a5

    SHA1

    4dd5a46154f01d2f0647297ca0d20fabd8145540

    SHA256

    855ef7a1141c91a5310dac40fa225b74f4d1df2566cccc638e29ab1a8968d6c1

    SHA512

    cd22a749b2102cd8a1676fd5006ce503e8f40e9564d84f6df021d25bef9f75e54ae17ab273bd4b3782ba21c3dfc46a520543cdbfcdb3e323d1780bdc783651c9

  • C:\Users\Admin\AppData\Local\Temp\tmp979C.tmp.exe

    Filesize

    78KB

    MD5

    e1e442787c1000989ff7fe373297c1bc

    SHA1

    9c3d545ccaf8a5cbf962c7d088f466831e658cf0

    SHA256

    0f6294afcde9b7ebdfc2dcc01e44f9af755cd902cc12560ec9b90e760f7c4a8a

    SHA512

    f03f81723f5d0153c94bf5dcc8ab06575d1509926d7df6c6482be448784b72139761c301014ee1a3c69d002067f53d3c1751552745af457619804060238edb91

  • C:\Users\Admin\AppData\Local\Temp\vbcE3996553BA58484084CFCBCAD3FEFC6F.TMP

    Filesize

    660B

    MD5

    74ba81b7ccb1da13fdf782465378cee4

    SHA1

    3cc289db92eb8564fe97ceae7cc8210229a4b507

    SHA256

    82b67f71f97b9c12941caf3fb76bd173868e49e443d37ef147a5699447da6370

    SHA512

    7a4dbfe1565548656f4868321eacd0fc16a77e9d59902cf03ffaa22e6e89917c0dd9a979f67fb99b3f3642be782ad000805fcf26bea9e168079cdbcf6025a093

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1072-1-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/1072-2-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/1072-0-0x0000000074882000-0x0000000074883000-memory.dmp

    Filesize

    4KB

  • memory/1072-22-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/2852-23-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/2852-24-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/2852-25-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/2852-27-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/2852-28-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/2852-29-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/5080-18-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB

  • memory/5080-8-0x0000000074880000-0x0000000074E31000-memory.dmp

    Filesize

    5.7MB