Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 02:01

General

  • Target

    a9ef922ff710081e2554ed94730b8dc620b7aae384d275e27e7024ce02e91610N.exe

  • Size

    78KB

  • MD5

    3d2f979953107bd80d5a53b523e4fde0

  • SHA1

    ddc2fb5add85c6742d37c887949755fff808a9b9

  • SHA256

    a9ef922ff710081e2554ed94730b8dc620b7aae384d275e27e7024ce02e91610

  • SHA512

    44663882d6e3d15e495ea1bf90eb157a50cd3e6da6611cbc57dce9a963bdf7b5367b17e6734ecd54f5b8cb8b5cd01cd8e98a00c4a51df8e5e5ce50a4e861c498

  • SSDEEP

    1536:myV5jSNpJywt04wbje3IgTazcoOEEQLwdCRoaeuProYMHQti67F9/g1Jv:DV5jS7JywQjDgTLopLwdCFJzDF9/U

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ef922ff710081e2554ed94730b8dc620b7aae384d275e27e7024ce02e91610N.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ef922ff710081e2554ed94730b8dc620b7aae384d275e27e7024ce02e91610N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tvoafhxh.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9971.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFA871294945D42F09243BB83F34CB41.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:684
    • C:\Users\Admin\AppData\Local\Temp\tmp9673.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9673.tmp.exe" C:\Users\Admin\AppData\Local\Temp\a9ef922ff710081e2554ed94730b8dc620b7aae384d275e27e7024ce02e91610N.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9971.tmp

    Filesize

    1KB

    MD5

    7fc5e9c152680051be42bd385b7db7c2

    SHA1

    5ba0f5aee8f85faac15901f2b033c628f546330b

    SHA256

    8ee8ae13edcdef0c831b251c618a8187ce010951fd80a7f14f0e8bf9e2c20b50

    SHA512

    20d617db0f853b46dd6be14234d4435ff63861f91bd3316f9ac1d7b3ca0109a470bbe0a4ddcc9b3551b521cdd2c6c026b3c61b3769ee4004994c2920ecf38263

  • C:\Users\Admin\AppData\Local\Temp\tmp9673.tmp.exe

    Filesize

    78KB

    MD5

    0a8e9c04e85feb903410ef04ddf827e4

    SHA1

    e51b7211eb6c3a8add9a3a1921d9bfd8ceb6d411

    SHA256

    62d3ca83336ff51c16f3eab110638b0cfe9b3f163ff644a6c2340342cd72b877

    SHA512

    bd8f1413cf368758677bd7c18450423bdca41ac001c9b9af640856000118a76cd47454574957e5b6dc8e73fef664e1a4a92caa2128802d9e6a6424082d724083

  • C:\Users\Admin\AppData\Local\Temp\tvoafhxh.0.vb

    Filesize

    14KB

    MD5

    a9d508d47fc1c635714583b8970acaac

    SHA1

    eb725106ef27b9552aa5bbc3f3dbc662ff8ce739

    SHA256

    fa5d6bd9d81f7a0de2ea010f8529a3aeb9ff8ec19b7fdad414837f66defd79df

    SHA512

    d3183b04735624b8f7150a5135f63a0047bdbc2102812941409149306e9366a847cfe98b30be556c13c950654e61ba75009462332220e60fe7b214106561f8dc

  • C:\Users\Admin\AppData\Local\Temp\tvoafhxh.cmdline

    Filesize

    266B

    MD5

    ba846d150ae8cca2bf3b195a3b5ffb67

    SHA1

    61cff4ec966423e9b5eac003a58fc85df1c4f7e5

    SHA256

    5a9d63c947c2845ac43e1ada1373c059f3ae4a1e82d68b861b682d4b86644d9f

    SHA512

    ed931fb5ffb8e043b94079b81034e4741bbe0017b22b0e331e8a309724e58b57da5ffd14fae880552776c0ed698bcae5ab3a7fd7af241975d9afdb10d3009888

  • C:\Users\Admin\AppData\Local\Temp\vbcFA871294945D42F09243BB83F34CB41.TMP

    Filesize

    660B

    MD5

    b5d5c857925109f37981d21bf66ab2c6

    SHA1

    39c759750d0ed72e1a200a4a21146ea5d20f56e8

    SHA256

    efc31147b10f26f2ebab39b478ae6b8a2a836e7ebdec38998e316efb6b16ac68

    SHA512

    a8484ed80ece00ff8ffb8aa9e76d314e2ca0ddc7d6399c9bd0540a05a821ced0441316a2f8cd2e06074ea790b5f989b23823c9aff977428db9196d00cf934724

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    484967ab9def8ff17dd55476ca137721

    SHA1

    a84012f673fe1ac9041e7827cc3de4b20a1194e2

    SHA256

    9c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b

    SHA512

    1e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7

  • memory/880-23-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/880-24-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/880-25-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/880-26-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/880-27-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/880-28-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/1388-9-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/1388-18-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/3948-2-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/3948-1-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/3948-22-0x0000000074A70000-0x0000000075021000-memory.dmp

    Filesize

    5.7MB

  • memory/3948-0-0x0000000074A72000-0x0000000074A73000-memory.dmp

    Filesize

    4KB