Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe
Resource
win10v2004-20241007-en
General
-
Target
4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe
-
Size
78KB
-
MD5
132924522d6f601fdd5c7b3a68108e1f
-
SHA1
fcde9697427c4adaefbacf41c376d19e1a1cc38c
-
SHA256
4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53
-
SHA512
0cdeeb277a1d2e8761c096a6d7cffe6dcb8461299d9099a72fe42269478d5e84458e0f6cf03544b6fa9fa8f4f6054e9536d0b5bd314e58a268ffd351e5927de1
-
SSDEEP
1536:K95jShvZv0kH9gDDtWzYCnJPeoYrGQtC6A9/f1T4:w5jShl0Y9MDYrm7I9/K
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2660 tmpEF10.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmpEF10.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpEF10.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe Token: SeDebugPrivilege 2660 tmpEF10.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2936 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 30 PID 2704 wrote to memory of 2936 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 30 PID 2704 wrote to memory of 2936 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 30 PID 2704 wrote to memory of 2936 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 30 PID 2936 wrote to memory of 2764 2936 vbc.exe 32 PID 2936 wrote to memory of 2764 2936 vbc.exe 32 PID 2936 wrote to memory of 2764 2936 vbc.exe 32 PID 2936 wrote to memory of 2764 2936 vbc.exe 32 PID 2704 wrote to memory of 2660 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 33 PID 2704 wrote to memory of 2660 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 33 PID 2704 wrote to memory of 2660 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 33 PID 2704 wrote to memory of 2660 2704 4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe"C:\Users\Admin\AppData\Local\Temp\4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xrw508yd.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF078.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF077.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpEF10.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpEF10.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4b2e1060cff24415c0960351de6e6dbecb397378d6eeabedfebc182dc0bb5f53.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD536df58a2af54a84e528b1c32ed088ce6
SHA1b1538e14ca89a54a6159f02ade0894236f2fc7ca
SHA256b993e0aeabc38796a913231033ae5801f774dd175c467b3743169497654a4867
SHA512167d29894056faef6f44c9de9b8c8aee6a4f41d669ed83024e1bc3ee9a444b8a3d4267916439a03d05b94dfdfc3b795e855fa87cd10e6e5009741baec5fffa0f
-
Filesize
78KB
MD5116eaa75fb447d1704f8ae6506266e6e
SHA1c07df06be1a7aa19ec31f386fd3c3c64bb6b7327
SHA256deaebefd440f9f5d55ca5b523bbba4bfe46196669ac9760f90f3430870f102ae
SHA5121efbe581cf8c9d740f0cd76a9304f3c222668e7612bf98c79aa90afd7e1988875a981989d381f16dd396814c4e7600fe765befdd795913e8c2b3dfe45f60f856
-
Filesize
660B
MD543c689cea931f8e32b44ce14617a67fa
SHA131cfcb3c5247e563589729e0b49a5d700e37a1d4
SHA256424933df513b4983855058f20cb9c3cf7b17ce63d21b2f0a57766fd1c9e6741e
SHA512ed685e8d6cea04924b4cd04b0a83550697676c81875aaf337b7691d723bd3d77f680937807f644812b72393b522dbe897407bab459616a2d8e3ea2756eff2e1d
-
Filesize
14KB
MD5c5d0d699be637a2be34fe54b848ec8c0
SHA183dc80d93875cadf90f0a02216927baeae0a62ec
SHA256f779945ba6563295d103a15f5730ed5b8a4a12230f265bb12c908411a27fe59c
SHA512fb24f7fc254406cfc706d766eacb79f685f571471dd6ee28e1ded309bd5b0b4d2fe8a907b442322df16151d3969dfb2a6683e8f6dc0c893b0406a58feca623a6
-
Filesize
266B
MD56cae39b6b3d084e7d9eeb41148a885dd
SHA17f86927e8e6549446fe3f17e5c0e710348caeb5f
SHA256757df513aa06842758126cdde611a6864c9e66344a250b1e654febc8e0f58a3e
SHA512aeb990203a2c7a82ab6b5a6177af598321e1da9d5ae2cf070ca939ebcf83f29416337877921bad2f78c3cba085516470f9fc54acee822b8a273c8ef0a48c4af4
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d