Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2024, 19:55

General

  • Target

    d06b61e67bd51d8aaefe7f6f70d6f3b0bbf28ac751c45e2be86374e4ece1fdd0N.exe

  • Size

    78KB

  • MD5

    92cfc5ea9fb90ef75c1332b239f901b0

  • SHA1

    5b8afe92cd629812038078ec3902683bbc568b92

  • SHA256

    d06b61e67bd51d8aaefe7f6f70d6f3b0bbf28ac751c45e2be86374e4ece1fdd0

  • SHA512

    5286a497bb2a7ef04d7b115ba101e52f58b0e33c5e7c7c80c779f102a723259ab2b7bbe756ee371d6f03a701580d1eee163a325bd647ed10f4fafd0ba365c2af

  • SSDEEP

    1536:b58gpJywt04wbje37TazckwzW4UfSqRovPtoY0BQtN669/fk1hR:b58eJywQj2TLo4UJuXHhJ9/fy

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d06b61e67bd51d8aaefe7f6f70d6f3b0bbf28ac751c45e2be86374e4ece1fdd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d06b61e67bd51d8aaefe7f6f70d6f3b0bbf28ac751c45e2be86374e4ece1fdd0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cjl53v58.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBCF7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc34A3DBDE2F954F3884EEBA712E71CAD.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
    • C:\Users\Admin\AppData\Local\Temp\tmpBB70.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpBB70.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d06b61e67bd51d8aaefe7f6f70d6f3b0bbf28ac751c45e2be86374e4ece1fdd0N.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESBCF7.tmp

    Filesize

    1KB

    MD5

    598938f3a33353d19e48d8b4294f1212

    SHA1

    71b3c8528bad19114af1770182f25d81638bfad1

    SHA256

    ccfd27f052b02bb00efc5c960980671c72fef5c0d49b9f5d1003b642e81c297d

    SHA512

    af5e4f4a3c696a5aa815c2a64626bae639b6786ed3c642f6bcc3c6f89b602f6aff86a816d14f6258edbd64fcb9910fd381f3f726daa9dbc28ce9106dcfc8e1a8

  • C:\Users\Admin\AppData\Local\Temp\cjl53v58.0.vb

    Filesize

    14KB

    MD5

    46172151fc0cc7e390a5b63d011c75c9

    SHA1

    73944350e6bbf8486f7f3e4a7f61b7af8b457a94

    SHA256

    43f420644e64127644c91ccfb542404e8dba39b0e0f35a563a2adad2dc12a8b6

    SHA512

    c1a10f8ecb2aab7543379be0c0d95b940dfac2eabe7ea2f65c0d9609d7585a57d673b4e7a061fec1e75c0f9fb66ee6976987d33c2810663e5913007a30ae39cd

  • C:\Users\Admin\AppData\Local\Temp\cjl53v58.cmdline

    Filesize

    266B

    MD5

    27edf1e31ce1443a3fc0c88dfab7ce12

    SHA1

    ec21817ecca4b7227f557d426d6f1a2459c5161c

    SHA256

    667779084916ee21c046670f544dd59de4fefa6ebf9ed8813321365bcf2e98ab

    SHA512

    24457548ce1f3b522f80f8b622f3184cbc5b7f1123732b31911458a35f4a6dbe2e8bd71c0b0ba2ac78586c341c4de1b7032372788211565a53042eef67876aa7

  • C:\Users\Admin\AppData\Local\Temp\tmpBB70.tmp.exe

    Filesize

    78KB

    MD5

    be3dc4bea0173f8b1e764d3848ce64e0

    SHA1

    1aa62c30dabdc03b28a2674ad284d6b759c92553

    SHA256

    b9bd7966d04a9d63c7a62a4ba92728d68de7d634349adf27c4c52513337e806c

    SHA512

    1179cd590d059b9eda1e66d9d212f4d45e85eeb7be924b89f84637af6692331c30cc3a6f54c3fdbcbd06287c80747e2a73064dcb499fb8598b57ce8db4ac89e9

  • C:\Users\Admin\AppData\Local\Temp\vbc34A3DBDE2F954F3884EEBA712E71CAD.TMP

    Filesize

    660B

    MD5

    881a01e1e57e233b14bb290ba0f55760

    SHA1

    616c29f9712661fab95d871f1d4a387cdfef7805

    SHA256

    55536805cefd8f4b2065762a5b44167840b282b903b984a28f7e00b1d87ab1a4

    SHA512

    f75af192fad8960455d24d24a47c6483924f90f758b4f9dc74246e2bb2ec11e14e3664f5b4854fb8102fb9a9a4c8dc508bbc002033cf1bf4fb70cf69fcce697c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8008b17644b64cea2613d47c30c6e9f4

    SHA1

    4cd2935358e7a306af6aac6d1c0e495535bd5b32

    SHA256

    fc343d0c2ee741f89cc4f187d7b6694397765e151dbc737052df4c19d7a36c55

    SHA512

    0c1161a8ebcc659ffd920f0607cc751ece0a0c918a8d3b8f8ca508ebc03b854c29bd0bdf1518922c4525a825f90ef3bca8c7540975d4ecab9182b9f0ce6880ea

  • memory/1860-0-0x0000000074E62000-0x0000000074E63000-memory.dmp

    Filesize

    4KB

  • memory/1860-23-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/1860-1-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/1860-2-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/1932-13-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/1932-18-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-22-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-25-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-24-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-26-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-27-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-28-0x0000000074E60000-0x0000000075411000-memory.dmp

    Filesize

    5.7MB