Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 04:25

General

  • Target

    2dc50f54815e3c28cfb45222a03c2a807d45ebe8e40591b9f350fe8df1a6e253N.exe

  • Size

    78KB

  • MD5

    32915e98578fd173cc72a957b628b6b0

  • SHA1

    8fedfd565d4fdd0fae1448726fe6bdd9964badf9

  • SHA256

    2dc50f54815e3c28cfb45222a03c2a807d45ebe8e40591b9f350fe8df1a6e253

  • SHA512

    3d6f9e8115bbf6d4621a03374b86c04da05b46da735ba3c03a3cbe8d935c1a9d2ac62d1bcfc380661d118a9dd2889029b4950541e0c9341f08cdb1c124bc7ccc

  • SSDEEP

    1536:pmy58XvZv0kH9gDDtWzYCnJPeoYrGQtC6E9/31Gt:sy58Xl0Y9MDYrm7M9/E

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dc50f54815e3c28cfb45222a03c2a807d45ebe8e40591b9f350fe8df1a6e253N.exe
    "C:\Users\Admin\AppData\Local\Temp\2dc50f54815e3c28cfb45222a03c2a807d45ebe8e40591b9f350fe8df1a6e253N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wmabhqia.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8BE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA8BD.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2656
    • C:\Users\Admin\AppData\Local\Temp\tmpA7F3.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA7F3.tmp.exe" C:\Users\Admin\AppData\Local\Temp\2dc50f54815e3c28cfb45222a03c2a807d45ebe8e40591b9f350fe8df1a6e253N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA8BE.tmp

    Filesize

    1KB

    MD5

    aba87b08079b4a511694d2484ea8f67f

    SHA1

    b2255631c1529ace5b6f84492731c690e135d94d

    SHA256

    bb2760c6494c53d32bf923d83a1a8bed784b61ab0997d2e79bb31f71480440f8

    SHA512

    360cc992803e109b0cc9d0fcdb820ffa3eb32b8df15ae62948172ff5cde18b511365f64f51b6e94b311a12ed8fae8cff64e1a006b16f206ae285b511023c173e

  • C:\Users\Admin\AppData\Local\Temp\tmpA7F3.tmp.exe

    Filesize

    78KB

    MD5

    2225f5da208be66d3f1fe78e0deab318

    SHA1

    f59729acf772b778ef001081687b49c7318a10ff

    SHA256

    5a28a7c0a0db89a3288fbf01d81344c13cd6468761c9c4fdab675ff8a381f739

    SHA512

    7bc1f932c37bfa5349287cef2a0e0d1cdd4ba26f97ce093297c48bea8e35f9d9ff609f921c6be5cf5d3aa78b5ea9d464710bdaf7d69e2d778ce77067edb976da

  • C:\Users\Admin\AppData\Local\Temp\vbcA8BD.tmp

    Filesize

    660B

    MD5

    e6bd2b06bc926b758a33ad34f0ce3de9

    SHA1

    42ef70af0023eca93c1af6699e65fa9e7157dd37

    SHA256

    233625a6a8008bb56234b7aae933bc026740fe3f8a02f42bb23235667bfaaafd

    SHA512

    2e2e432c7ff000e516b9c29966beeaacd9bdf4f0e114bd55a4a817b148c18786be6f5a9817414c1539e479bd620c83851535ac719380cefdc5e6c3524603df1d

  • C:\Users\Admin\AppData\Local\Temp\wmabhqia.0.vb

    Filesize

    14KB

    MD5

    6e72d2e096e0c890099155a214dc0d89

    SHA1

    e68219770b0a6e3f77649ce1acbb9b106384fdce

    SHA256

    11537741943fe7d22bc175964f423ae2c8180b6e2ff52facaf62d63803683295

    SHA512

    924c3f906ceba6d1624a6e748d5f4baac110f745748adaeebfce89d786543f9dff12e9bc2cec96648997707272f5a7e20e613d14a9e9d1cf253c692bb8a0c72d

  • C:\Users\Admin\AppData\Local\Temp\wmabhqia.cmdline

    Filesize

    266B

    MD5

    3b9eb12e2a29132cb29543942620d36d

    SHA1

    7adffccef8f3c6034f47513da09660a6418590a6

    SHA256

    ef42a0fe0e5c3db6fa52926dd45a57be9658477f641964b76715034f5e8a9ea7

    SHA512

    505569b630e4163545b7cd1fe59045446961a5c9a4e6be33544c2db631815196e0d1bc094bc1cfa5f81f6f9ded1a4f68d19a5f4a4f01f884c7e2bda14da0ea6e

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/1936-8-0x0000000074460000-0x0000000074A0B000-memory.dmp

    Filesize

    5.7MB

  • memory/1936-18-0x0000000074460000-0x0000000074A0B000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-0-0x0000000074461000-0x0000000074462000-memory.dmp

    Filesize

    4KB

  • memory/2840-1-0x0000000074460000-0x0000000074A0B000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-2-0x0000000074460000-0x0000000074A0B000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-24-0x0000000074460000-0x0000000074A0B000-memory.dmp

    Filesize

    5.7MB