Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2024 11:11

General

  • Target

    f7009c61ab6364adcfb840f50a915121284bbf3057a619a0f627facc245e1e23N.exe

  • Size

    78KB

  • MD5

    9422efada8edd6cfb7d74f9bf867f330

  • SHA1

    3a0ad0f149805568307df9cfbf394919c91ef422

  • SHA256

    f7009c61ab6364adcfb840f50a915121284bbf3057a619a0f627facc245e1e23

  • SHA512

    6c7237b51692e8a0131e4426685aafe40b5ea9ee9b68194c0ca96a4b0bc04c68d155d657c6e191bfd03bbb0a58cd2cd6302df849a7210e14716c73667338306e

  • SSDEEP

    1536:9PCHY6M7t/vZv0kH9gDDtWzYCnJPeoYrGQtM9/0xO1sW:9PCHYnh/l0Y9MDYrm7M9/x

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7009c61ab6364adcfb840f50a915121284bbf3057a619a0f627facc245e1e23N.exe
    "C:\Users\Admin\AppData\Local\Temp\f7009c61ab6364adcfb840f50a915121284bbf3057a619a0f627facc245e1e23N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kjc3cmsx.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8D3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD7DB619C5E4B40979D811093D03925A0.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:312
    • C:\Users\Admin\AppData\Local\Temp\tmpA6B0.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA6B0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f7009c61ab6364adcfb840f50a915121284bbf3057a619a0f627facc245e1e23N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA8D3.tmp

    Filesize

    1KB

    MD5

    998b737045baf201b5316a01cffefcc7

    SHA1

    09177e9b233761d128cc64b2b32034fc34757c2e

    SHA256

    04482f07a3521818841dd5ddeeefda47bfceb4422e224f94f5f13dff9a9e7840

    SHA512

    b4819b9f26adc0b36eb73c18bd98f2411f3b5d82dfff95890d0aa2d0b4206e91b0a45afd981ecc6ca7e8d3808b61e9b6e339802346e3d8857509eee7637818a5

  • C:\Users\Admin\AppData\Local\Temp\kjc3cmsx.0.vb

    Filesize

    15KB

    MD5

    d469d8c86a5ca1b0b6ea9d7ac24031e9

    SHA1

    82f682d3d7c1c2b39a17b873a363f1347acf0279

    SHA256

    c6f7c8375251dc571b4f0a2137988bb1388efd23dba61fddf4c606b10580c8be

    SHA512

    5ed5faf51f7008bbdf178179bc619c476ca538486e884370bac28947b1c8778cf01ae42648c85a735af1a5d46f3ac5c0dee89d8e8cf0a5478d31069bcd578e2a

  • C:\Users\Admin\AppData\Local\Temp\kjc3cmsx.cmdline

    Filesize

    266B

    MD5

    61626a3ea79223e915a9d1c77ddb7906

    SHA1

    f553c708993779f3a02cf384c81ead1353a23779

    SHA256

    c244b83bf546ace69e2726142f21e9a2eb15d1dd5259e53e9c3ff65c1f5787ce

    SHA512

    69cd683169730856cb83056438a7cd96d75517988ebe328c2bb84cf4be688e9138eb84639c064b64ff6908d97cdbce0c8794fa7ecfc1afc72149cd8040449624

  • C:\Users\Admin\AppData\Local\Temp\tmpA6B0.tmp.exe

    Filesize

    78KB

    MD5

    4a0e3d9d391c9273498df331420fed32

    SHA1

    9c4df3defc1a9afe6704f3986bc19c26e3954e5a

    SHA256

    31b4e867a123acfd548d9aa61da3cfb9cb62815eb163adab227c89c78b090d80

    SHA512

    7fc4666ccc32d64c14f649ad1fbe739f857bd77af1354c191d051d3988c45047524eed1c4049e90dc2d8ae603baacde1cd4d488eb93824fa4b0a175442497978

  • C:\Users\Admin\AppData\Local\Temp\vbcD7DB619C5E4B40979D811093D03925A0.TMP

    Filesize

    660B

    MD5

    60c48cd5b9c4bb2c4b534446bcf9f71f

    SHA1

    be4a5602ad688b36bb594e1c8b3e6365d2bb56d3

    SHA256

    d758dbbcbcf1c94004e4c8fa55ebb7b9f786612755088f8ebb055456f8b4f587

    SHA512

    0a7ea125010cf84df169082a531611be5b04fa86dcdb466079bfc0e62848c6b623503f5ec9927d9d1dc37f620ec9eb53b9b1ead2faa776fbc492fe8058e2b496

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/2236-27-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-28-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-31-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-30-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-29-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-25-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-23-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-24-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4392-10-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4392-18-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4792-22-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4792-0-0x0000000074842000-0x0000000074843000-memory.dmp

    Filesize

    4KB

  • memory/4792-1-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4792-2-0x0000000074840000-0x0000000074DF1000-memory.dmp

    Filesize

    5.7MB