Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23-10-2024 06:29

General

  • Target

    fc4b2dbed4ab61061e08c88ce16b2a0a37127c99870192d62123800ee7feed3c.exe

  • Size

    78KB

  • MD5

    aceb7423395e8efe850671491e18f6bc

  • SHA1

    86dd0be3a5e9f8d64aa771f4e3e59c62df3814b7

  • SHA256

    fc4b2dbed4ab61061e08c88ce16b2a0a37127c99870192d62123800ee7feed3c

  • SHA512

    c2c03ec526e635f29918f1a12076e772a73f8746f3f5a2f96f114b5c0c9711899fb3e058d766e5fe6f28abdcad76ee434e9f2f9ec9f85b6a7dd2b867d00d4768

  • SSDEEP

    1536:lPWtHHM7t/vZv0kH9gDDtWzYCnJPeoYrGQtc9/S1gc:lPWtHsh/l0Y9MDYrm7c9/+

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc4b2dbed4ab61061e08c88ce16b2a0a37127c99870192d62123800ee7feed3c.exe
    "C:\Users\Admin\AppData\Local\Temp\fc4b2dbed4ab61061e08c88ce16b2a0a37127c99870192d62123800ee7feed3c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zfozobij.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7FFA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7FF9.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2952
    • C:\Users\Admin\AppData\Local\Temp\tmp7F5D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp7F5D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\fc4b2dbed4ab61061e08c88ce16b2a0a37127c99870192d62123800ee7feed3c.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES7FFA.tmp

    Filesize

    1KB

    MD5

    3b511ce4920630c89da2d4baff429b52

    SHA1

    d8907ae9816080bc853c6791262ef004bddbdd2d

    SHA256

    c727c8ac86b432e927de5f3f2c263b95668f185d86fdbdb269cc5bf5f1bde5b3

    SHA512

    ac43ec0e28f1c8316e95d6d2b8d745721ef7c29c17faaf5e2225e40756cd81cfbf3aa2c9543f4141b8d02c70fb420b6acf7bc5d3cbfec931b2e300920b3291dd

  • C:\Users\Admin\AppData\Local\Temp\tmp7F5D.tmp.exe

    Filesize

    78KB

    MD5

    d879e31b0217fb6ba6bb6f34cdef7508

    SHA1

    51d2996fb37a3f760ad6a3a4a4f198b4f9f222f2

    SHA256

    35b9b2246ce8ffbc023cebec9b9a697dc29666769029894ba0dc75b70cef1644

    SHA512

    12d1698b709f395e2b038e74ae7b868ab13a2de604d56bd2d1df6fead2dbf4eb0063ae94e391e6746f9179c3928df92bf55b8cb7f69471239b8c4f2c6e0c798f

  • C:\Users\Admin\AppData\Local\Temp\vbc7FF9.tmp

    Filesize

    660B

    MD5

    c3befe39838f43fc23d69ba33c1f755d

    SHA1

    9d5145198c06edf9dfe4a6458ef53323c67d100e

    SHA256

    ff1ec6a8b061aad56fd644ed771b6d8eed68413ff79d4e88883dee47af894d26

    SHA512

    13fd2aceabfd5971eb1182e6145533e502c9ac28f747bfe8f9b9fb65e255d6d744551ee8db1f4bf43461251d21bf6e784d50635ab8c30f9081cd3d4e87be19e9

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • C:\Users\Admin\AppData\Local\Temp\zfozobij.0.vb

    Filesize

    15KB

    MD5

    5acdbf635ad7f95c5e3661df59f70350

    SHA1

    320ba97573420d0e8af8c13e81376137c2e8e4ef

    SHA256

    892ab7aac9b71bbd84b2678877ac75faf9ac151a59cc396d0d70a4209c64dbd1

    SHA512

    898a12465ad9c2518c9fb2e8041075af63252c435f69f85bb0c735a9f3a759245e0a0bbeb751a324e65affc03e7ea07b2eb46a2cc9c14d9fdbb79247480a7a9d

  • C:\Users\Admin\AppData\Local\Temp\zfozobij.cmdline

    Filesize

    266B

    MD5

    b6899c83e1a80ce79bdcb31a13d31a26

    SHA1

    62497f63836e3b5126316886b3cec3d5d5e15cfe

    SHA256

    0903bbba840598a41764a3d469981257de74ff03fe3bd67dcf848fe7d242411f

    SHA512

    a65b53808612e16d7842bf6907dbdebae618135b36b61612ac5de66214db9271850cad3fbdf73346915bad8b697c339c4271e337bc4c0318df00fde819fcb8ee

  • memory/528-0-0x0000000073EF1000-0x0000000073EF2000-memory.dmp

    Filesize

    4KB

  • memory/528-1-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB

  • memory/528-2-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB

  • memory/528-24-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB

  • memory/1476-8-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB

  • memory/1476-18-0x0000000073EF0000-0x000000007449B000-memory.dmp

    Filesize

    5.7MB