Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2024 03:07

General

  • Target

    87cb00d95b5d5c7198419e60dad3383afb3ba96242de5a81279d04ca66661fd9N.exe

  • Size

    78KB

  • MD5

    cfcf6110dc1037ebd8abd3501683d150

  • SHA1

    4122722b2d5c2e47ad558b6cb68c49b762790639

  • SHA256

    87cb00d95b5d5c7198419e60dad3383afb3ba96242de5a81279d04ca66661fd9

  • SHA512

    7fcb97782fd912d4923d70bc5a0f2ddfe9a422d59303d696566986745addc5253ff46944bd08169f86798e8de0daf75224a4d01fcd52915429e8ec6aed72d94b

  • SSDEEP

    1536:KcV58xAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti699/x17q:/V58xAtWDDILJLovbicqOq3o+nl9/S

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87cb00d95b5d5c7198419e60dad3383afb3ba96242de5a81279d04ca66661fd9N.exe
    "C:\Users\Admin\AppData\Local\Temp\87cb00d95b5d5c7198419e60dad3383afb3ba96242de5a81279d04ca66661fd9N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\euy6_puv.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES853D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc592856235494331BD3AA9AA8444717C.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2292
    • C:\Users\Admin\AppData\Local\Temp\tmp8359.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp8359.tmp.exe" C:\Users\Admin\AppData\Local\Temp\87cb00d95b5d5c7198419e60dad3383afb3ba96242de5a81279d04ca66661fd9N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES853D.tmp

    Filesize

    1KB

    MD5

    c6dfb777bb98c3752c87eff873ed0ec9

    SHA1

    2bcc190a38b580a1b8713168d95d6e5a10f0fb69

    SHA256

    2c5318cca7b362bc461d774acaf91c142289dfabf47db5b277679cb93d52842b

    SHA512

    baee4ac7d6d038039eac1882886f5cd2e1b7dfcd38f8bc051b7c98aeb1936f3d932bfdff23d7846e273c510e0abb1d9a79dc2553adffe2550ff2568f6e14ed7f

  • C:\Users\Admin\AppData\Local\Temp\euy6_puv.0.vb

    Filesize

    14KB

    MD5

    e7bde91e474d56088fb49a5d25c99201

    SHA1

    a7e8de2602780da230242e498bd789010cfadf74

    SHA256

    09057a1bd147c73e1ba46d18bcfe39b21f7dd91a54811bd1383501f1b425e0cb

    SHA512

    c21360a30b792a36f3f3b673333b76a1ab2ab137c82e73b6a1e67278b4ffe3a307195a8f3130eac9a26ac7f51a8d18a932209645391ffc4d827f220c27822c89

  • C:\Users\Admin\AppData\Local\Temp\euy6_puv.cmdline

    Filesize

    266B

    MD5

    ee065285833c2cf8ef1e1cbf32470004

    SHA1

    e7832d3f906ea0965033015c2776520491ed7e06

    SHA256

    d3e581974b94074163f8e9cd0b2dbae13b726cf7faa2ad46a02cd914a4eaa7ba

    SHA512

    3c306211760e0f8d77e2011574993fd7d615bbedf6459ebf0747b0a959d8e94f1e5e19d85d97323942070012e26e6672cbb7ee4f29b127aac97e23d4783dc9c9

  • C:\Users\Admin\AppData\Local\Temp\tmp8359.tmp.exe

    Filesize

    78KB

    MD5

    db532baf5ad79011dd5656c043149be3

    SHA1

    c58f14d3acc40167f380a3c2b7d2bfdb4ed97213

    SHA256

    aae1898cc31ff4c9c4a3fde3250d335f7ff948e9cd1e61a365d15f2751bd18c5

    SHA512

    6967e88e334cf554230c6fc6d780b49368de36b92a4ea7df1070c10c44f4299bd8af78c72b87f2fda37ba96df0cd34d4371d98eefee2fc741e4a9af486833417

  • C:\Users\Admin\AppData\Local\Temp\vbc592856235494331BD3AA9AA8444717C.TMP

    Filesize

    660B

    MD5

    b454990bcecc2d05315212d5de1c9fc3

    SHA1

    1df753fe5a7c297248cb10fb79ded4ed9e89d81a

    SHA256

    ee6131e2f7f2ffcdc71037b6df8bb3a54767e00fee6a35dc94d9492f94f0a84e

    SHA512

    3a35724684824a3579f02478ac79c8bd7445eb1cae62aca9eed6bc92341fe0797add211b295360b648bdc7dcab92809c641e696f2e3d46b287074776093932a1

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/2484-9-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2484-18-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2800-23-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2800-24-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2800-25-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2800-26-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2800-27-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-0-0x0000000074F72000-0x0000000074F73000-memory.dmp

    Filesize

    4KB

  • memory/2924-2-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-1-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-22-0x0000000074F70000-0x0000000075521000-memory.dmp

    Filesize

    5.7MB