Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 22:12

General

  • Target

    5a104524b7b9bf321f6469665fd8182f49f3adf004ebd11e2a2f9f2ae1b4876a.exe

  • Size

    78KB

  • MD5

    5c6d7e3cf605e022d8abc27d32563ebd

  • SHA1

    ee759c776d2c9609bb9831b83ea23b11179d06e5

  • SHA256

    5a104524b7b9bf321f6469665fd8182f49f3adf004ebd11e2a2f9f2ae1b4876a

  • SHA512

    34102b479dc871db5595fb3422f0e2da8a950db4385f0c3bd9a0ce531075a4593c84b83ec7fafddc3e84208f208910cabeeb23072b4ad0a3e39eb404fc1f516d

  • SSDEEP

    1536:zHFo6M7t/vZv0kH9gDDtWzYCnJPeoYrGQtn9/YCE1BJ:zHFonh/l0Y9MDYrm7n9/YCu

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a104524b7b9bf321f6469665fd8182f49f3adf004ebd11e2a2f9f2ae1b4876a.exe
    "C:\Users\Admin\AppData\Local\Temp\5a104524b7b9bf321f6469665fd8182f49f3adf004ebd11e2a2f9f2ae1b4876a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qlqof1vx.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD1A2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD1A1.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2344
    • C:\Users\Admin\AppData\Local\Temp\tmpD0E6.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD0E6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5a104524b7b9bf321f6469665fd8182f49f3adf004ebd11e2a2f9f2ae1b4876a.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD1A2.tmp

    Filesize

    1KB

    MD5

    d137d917c5b4cdab290275db284829f5

    SHA1

    8e2fbf87ff4d3eceaf4f5d87e10b6635a47a02df

    SHA256

    8a6cfa573111207b976f1bf9b641cc0f0e9f662ebc66dd023d12c2b20cd23a12

    SHA512

    3367f43f0c0ae61089bc7d9658792633a2746be407d9fe1784f7515a66e9f0ad989843bebc105400a32798203b0ecc4ff8e32b9c08d611645814aa4c1539e091

  • C:\Users\Admin\AppData\Local\Temp\qlqof1vx.0.vb

    Filesize

    15KB

    MD5

    5893afdf65337ec8662273f5e60cc19d

    SHA1

    66518971f905eaa9c947aa042b1d72350b0cdd25

    SHA256

    fef8a069e82efd441fc92820313816bb7407e5591a04120f6db8d63a3f6abe87

    SHA512

    482e5ce52e7804fde91489e92bf2628393e2bdfc99ffdfa12a7753503af789f1e89efad557e80bfb1ee917af381b0bff271bb17fc985b198c4c74a046e9409c2

  • C:\Users\Admin\AppData\Local\Temp\qlqof1vx.cmdline

    Filesize

    266B

    MD5

    28d7fc98c25b559e767509dfc50ea32d

    SHA1

    d299e1f7da65656e005f6a3353262f81cb4a0354

    SHA256

    816be93588660b5db051db202cd3d6a50237c5e404e82f72712c714ef39b5910

    SHA512

    9d3c510d923b2fb9e2973e78832e308d2cfbf04337b6bbae169e430e89915c6916c2d00909a2965916989f54740c232e87c191bcf434b45c791a0a467a1f0923

  • C:\Users\Admin\AppData\Local\Temp\tmpD0E6.tmp.exe

    Filesize

    78KB

    MD5

    cbfd022ed00cc2110949c8c47d98aec2

    SHA1

    2bd273fcfae72e74ed1de58ba6853575a78ad4ea

    SHA256

    2ce1fdf319c4f79d20554da06839dfc667d2380dc9f8e231a7dfd032d23dcf43

    SHA512

    398719bdfae3f1ac93bfd85b098d34576c70bff1a8a0300572408b8379b4b01db52e766cc297eeae5cf038ecd3be0e27d62b6dfb545e575bca8a079d3aed3cc5

  • C:\Users\Admin\AppData\Local\Temp\vbcD1A1.tmp

    Filesize

    660B

    MD5

    01eb55a7814580db239f3b1e11c16771

    SHA1

    958aa48701b8d86997a5327768a0b65477debf6e

    SHA256

    73224052e08b6665b33ead0bde046d3d2ef03793802586bf3a583614d9ac919a

    SHA512

    e976a785987bda4e23dcafe2ad3c168ceab98b608e9f4c0b85e0ef23afbb9981023bb3dccce4325ab944cba77908dd0534f76a05a522a7001978a9e3d206e3a4

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/2524-0-0x00000000747D1000-0x00000000747D2000-memory.dmp

    Filesize

    4KB

  • memory/2524-1-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2524-2-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2524-24-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2528-8-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2528-18-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB