Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2024 06:27

General

  • Target

    4484fe759be9307b4c3af22949c9fc079d37b401316682e0e4e2a18f24c98c64N.exe

  • Size

    78KB

  • MD5

    3be3da337f614dc1ea0697ee3da2f670

  • SHA1

    2757deb690cef71fea6d519d7db774a3fab47888

  • SHA256

    4484fe759be9307b4c3af22949c9fc079d37b401316682e0e4e2a18f24c98c64

  • SHA512

    eaf2896b8c0b5be90d166929e452872c530669f4d94a3c1daffd17a5d17bc96ee8a9999abe9f14781917c952b7fbd272e5466dcd0af01a90cb3f090644781c57

  • SSDEEP

    1536:VStHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQte19/e1k/:VStHFonhASyRxvhTzXPvCbW2Ue19/h

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4484fe759be9307b4c3af22949c9fc079d37b401316682e0e4e2a18f24c98c64N.exe
    "C:\Users\Admin\AppData\Local\Temp\4484fe759be9307b4c3af22949c9fc079d37b401316682e0e4e2a18f24c98c64N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xineg9ck.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B84.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA8D334F0E8EF4EC59A93F646302E91AD.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2928
    • C:\Users\Admin\AppData\Local\Temp\tmp9A7B.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9A7B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4484fe759be9307b4c3af22949c9fc079d37b401316682e0e4e2a18f24c98c64N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9B84.tmp

    Filesize

    1KB

    MD5

    b6b0cf3a6227d1c05d6c07519d955658

    SHA1

    6ce758d1d86f4241813d72631c29f27fb5808102

    SHA256

    b6771fccf52ed2b1c8877737adec35f9be6d381a7571f882d86e255bd30de15e

    SHA512

    b4e4e706ba9d499fdff0ca9b041b110e92eda9b1cecc85227e3953067d7c83032340999d14308b5406ae9ce5b6bcd25233d58d3050674a2422a0f90c60703d7f

  • C:\Users\Admin\AppData\Local\Temp\tmp9A7B.tmp.exe

    Filesize

    78KB

    MD5

    7cdbfc39c8518c92cbfa0d913de1b500

    SHA1

    0857c34d3e0072a9a588681dc4a5b49903f3eea9

    SHA256

    358e33d9927ba4fab72a7fc67489d389745335a916945904ce176e4ad2cabe30

    SHA512

    2e2005ffded5efd14a247c2a738ccb36f68696cc63d4a7129ed6456fbfb5e138a089cb8bd1c686e486a128bcfdf71f09323e43651e6c74c60dc676e748aea058

  • C:\Users\Admin\AppData\Local\Temp\vbcA8D334F0E8EF4EC59A93F646302E91AD.TMP

    Filesize

    660B

    MD5

    96ced5a0034a9b5260cb66fc081c0523

    SHA1

    d74b7a985d6f0706b42f71be75b89efff39dc03b

    SHA256

    c1d947134711fcb86e66e9de300cbd710c1b0dab4fbdcece0fa075d9b4b9a1d5

    SHA512

    3a2cb916b23bb97f9a3738d9b82b579614ee1e42745bdd7e6d5e4b726dd6a310a96b081637b386044376978995c0bb2c20b9e456f08007503149e281a063bf48

  • C:\Users\Admin\AppData\Local\Temp\xineg9ck.0.vb

    Filesize

    15KB

    MD5

    f7c559db2db71f3cfb9413ac609bc180

    SHA1

    ffb9e87e999e86fca7bc21097acaa9b02279153e

    SHA256

    24299729e2794a418ac93517a031c692f902de76cfba4b24931f07d689b29519

    SHA512

    2033a6c3a925f0b6229304165e0a67cfba8f740317957aa03ac720f3cea4cd0bef5e6d12e5a0fd8c5b4fc714177a1dcf517cb28706c72ae9b859132a679ae02a

  • C:\Users\Admin\AppData\Local\Temp\xineg9ck.cmdline

    Filesize

    266B

    MD5

    a0cc7676298093b11a0bfb5548d37e57

    SHA1

    a3d65aec66dace145b5e18c5f3ca860c522e4d17

    SHA256

    e2f3bbda91ec5981c3945d3a9bd0b6bc6ae1d81fe5760125a5fa44b853006309

    SHA512

    c83efe51a19abd0eb6c0aba341ea92440cbe70f929349125f71ec5296cfbc3baa24090761b4967432fff625cb2a4a65e045414d3ef57829ab743a0d561b3527d

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1348-24-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1348-29-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1348-28-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1348-27-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1348-25-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/1348-23-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3424-22-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3424-0-0x0000000075332000-0x0000000075333000-memory.dmp

    Filesize

    4KB

  • memory/3424-2-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3424-1-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3464-18-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3464-8-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB