Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 19:36
Static task
static1
Behavioral task
behavioral1
Sample
aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe
Resource
win10v2004-20241007-en
General
-
Target
aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe
-
Size
78KB
-
MD5
ed389ee9a2ce5adc29152cc4df7997e0
-
SHA1
fae9a619e69074a45ec8ae9e5dda17cfbdb88eec
-
SHA256
aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3
-
SHA512
8b66ad5c3a9da4fec83c733665f25e748e4149bd3bfcc0280a22d7a021461aed94859a45cb39e50dfa3930d057adbc1c2d779f30df8911d17694de3eda391be1
-
SSDEEP
1536:7tHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt+9/Q1za:7tHFo53Ln7N041Qqhg+9/H
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe -
Deletes itself 1 IoCs
pid Process 1472 tmp9F4D.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 1472 tmp9F4D.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp9F4D.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9F4D.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3552 aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe Token: SeDebugPrivilege 1472 tmp9F4D.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4684 3552 aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe 83 PID 3552 wrote to memory of 4684 3552 aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe 83 PID 3552 wrote to memory of 4684 3552 aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe 83 PID 4684 wrote to memory of 3704 4684 vbc.exe 88 PID 4684 wrote to memory of 3704 4684 vbc.exe 88 PID 4684 wrote to memory of 3704 4684 vbc.exe 88 PID 3552 wrote to memory of 1472 3552 aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe 89 PID 3552 wrote to memory of 1472 3552 aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe 89 PID 3552 wrote to memory of 1472 3552 aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe"C:\Users\Admin\AppData\Local\Temp\aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qnjur6xh.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA0C4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEE38A54A7D4C41389271BC87FB247793.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\aaffa2c3e7182d9da5a2097bc273758a55e0c66edc58aebd40da4113fe1374c3N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561d86a86b871d6ebce5757deafc5c56e
SHA137827094b3732b3ceb52c5a6dadb78a1119d38f8
SHA256ed9e9ef8129dcab740e9aa6c467e94a15cf3b0e6cb574afa243c34033e10ddde
SHA51235cec0311285f83ebc173e5be510b68460f87ff2b2adb9396cc86b1b0f47a864b19aa7fc176bdcc03522b736a0eac928b104824e0399735f51d4308dabb1c313
-
Filesize
15KB
MD5895e61c2ef59e1548209a2fcf4741015
SHA197fa8a64c7f92603dc45c43052003890e3876659
SHA256a2d44de835b8337b2f6d3793c2dc6742ec5ebb4867c6b678891928d0ecb2ebae
SHA512852d37e036a1ad1511888f625f65677800faae9d2e7b9aaa53ff72de0b1ad352f185d2ed653b467653431ad21c3b604ca9d7c24dd804da37925da52be13bf574
-
Filesize
266B
MD59dde8419ac25fd9aa3903587e5e2a349
SHA137800ab943f21cf2237a21a9c0385e188c5be8a2
SHA2560544749b4ee53e34c8d8c0f7e9fe06ddc4be956822ef1accac58332d5b1f422d
SHA5124ca84fd77e920fbd3d2c37c099b086bc8c77f91d5175d756ff501b94989362a54e85385d8201f1086004cde6bdc99e8dc6103b1ed0fc202e103a1f07367b0211
-
Filesize
78KB
MD51133ea99e2900bcb057be87139dfc5b1
SHA1d3f7b2117cb7a354dc99ddad08312351db153351
SHA256da3934ead84f88a7448e3e92e278c2b8bee701618c8472ed72a2686e9b851e1b
SHA5122b716cd067883ed6802fabb3bfbdd43e595f0dd851d4918916fcb40c93167da36ceb5518f6bc63ad464610e7dd1e72a3a086e111c43a1c57863bdcb7cbb8af07
-
Filesize
660B
MD5eca07a75b2ef93d5e32a656d0f573db2
SHA1ec22e3bcff4b85928f2d1b5cd2c05ef304a7170d
SHA256d977b636abc1ec8c3a3fa19786ad0733e51e80222254bc4eda893953b594dd40
SHA512fe980821fd68fe0833078da1478bffb7bc4af2e56c2204fb6a9101905eea3a7fdf9d44e7948af13b0804a035617fa39be3b1fd69c8904cace121d5060168cb80
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65