Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 19:36

General

  • Target

    aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe

  • Size

    78KB

  • MD5

    ed389ee9a2ce5adc29152cc4df7997e0

  • SHA1

    fae9a619e69074a45ec8ae9e5dda17cfbdb88eec

  • SHA256

    aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3

  • SHA512

    8b66ad5c3a9da4fec83c733665f25e748e4149bd3bfcc0280a22d7a021461aed94859a45cb39e50dfa3930d057adbc1c2d779f30df8911d17694de3eda391be1

  • SSDEEP

    1536:7tHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt+9/Q1za:7tHFo53Ln7N041Qqhg+9/H

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe
    "C:\Users\Admin\AppData\Local\Temp\aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qnjur6xh.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA0C4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEE38A54A7D4C41389271BC87FB247793.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3704
    • C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA0C4.tmp

    Filesize

    1KB

    MD5

    61d86a86b871d6ebce5757deafc5c56e

    SHA1

    37827094b3732b3ceb52c5a6dadb78a1119d38f8

    SHA256

    ed9e9ef8129dcab740e9aa6c467e94a15cf3b0e6cb574afa243c34033e10ddde

    SHA512

    35cec0311285f83ebc173e5be510b68460f87ff2b2adb9396cc86b1b0f47a864b19aa7fc176bdcc03522b736a0eac928b104824e0399735f51d4308dabb1c313

  • C:\Users\Admin\AppData\Local\Temp\qnjur6xh.0.vb

    Filesize

    15KB

    MD5

    895e61c2ef59e1548209a2fcf4741015

    SHA1

    97fa8a64c7f92603dc45c43052003890e3876659

    SHA256

    a2d44de835b8337b2f6d3793c2dc6742ec5ebb4867c6b678891928d0ecb2ebae

    SHA512

    852d37e036a1ad1511888f625f65677800faae9d2e7b9aaa53ff72de0b1ad352f185d2ed653b467653431ad21c3b604ca9d7c24dd804da37925da52be13bf574

  • C:\Users\Admin\AppData\Local\Temp\qnjur6xh.cmdline

    Filesize

    266B

    MD5

    9dde8419ac25fd9aa3903587e5e2a349

    SHA1

    37800ab943f21cf2237a21a9c0385e188c5be8a2

    SHA256

    0544749b4ee53e34c8d8c0f7e9fe06ddc4be956822ef1accac58332d5b1f422d

    SHA512

    4ca84fd77e920fbd3d2c37c099b086bc8c77f91d5175d756ff501b94989362a54e85385d8201f1086004cde6bdc99e8dc6103b1ed0fc202e103a1f07367b0211

  • C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe

    Filesize

    78KB

    MD5

    1133ea99e2900bcb057be87139dfc5b1

    SHA1

    d3f7b2117cb7a354dc99ddad08312351db153351

    SHA256

    da3934ead84f88a7448e3e92e278c2b8bee701618c8472ed72a2686e9b851e1b

    SHA512

    2b716cd067883ed6802fabb3bfbdd43e595f0dd851d4918916fcb40c93167da36ceb5518f6bc63ad464610e7dd1e72a3a086e111c43a1c57863bdcb7cbb8af07

  • C:\Users\Admin\AppData\Local\Temp\vbcEE38A54A7D4C41389271BC87FB247793.TMP

    Filesize

    660B

    MD5

    eca07a75b2ef93d5e32a656d0f573db2

    SHA1

    ec22e3bcff4b85928f2d1b5cd2c05ef304a7170d

    SHA256

    d977b636abc1ec8c3a3fa19786ad0733e51e80222254bc4eda893953b594dd40

    SHA512

    fe980821fd68fe0833078da1478bffb7bc4af2e56c2204fb6a9101905eea3a7fdf9d44e7948af13b0804a035617fa39be3b1fd69c8904cace121d5060168cb80

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1472-23-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/1472-25-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/1472-26-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/1472-27-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/1472-28-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/1472-29-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-2-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-1-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-22-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-0-0x0000000074962000-0x0000000074963000-memory.dmp

    Filesize

    4KB

  • memory/4684-9-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/4684-18-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB