Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe
Resource
win10v2004-20241007-en
General
-
Target
b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe
-
Size
78KB
-
MD5
0d40169fe50fde60e4e88e57ef018dd0
-
SHA1
55fbbc205c7ac64b480281f8418e0c5e5d430872
-
SHA256
b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bb
-
SHA512
860290b7444922a9ca23dcb37a927557ab6d44a3c00bea9f47950a23c6c6eaaf14e012f35308d4774905990c01483aa5974fd5704eeb374b3f2d6ea6bca2bcf7
-
SSDEEP
1536:FuHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtew9/UT1Od:FuHFonhASyRxvhTzXPvCbW2Uew9/N
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 1804 tmp80D3.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp80D3.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp80D3.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe Token: SeDebugPrivilege 1804 tmp80D3.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1848 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 30 PID 2076 wrote to memory of 1848 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 30 PID 2076 wrote to memory of 1848 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 30 PID 2076 wrote to memory of 1848 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 30 PID 1848 wrote to memory of 2300 1848 vbc.exe 32 PID 1848 wrote to memory of 2300 1848 vbc.exe 32 PID 1848 wrote to memory of 2300 1848 vbc.exe 32 PID 1848 wrote to memory of 2300 1848 vbc.exe 32 PID 2076 wrote to memory of 1804 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 33 PID 2076 wrote to memory of 1804 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 33 PID 2076 wrote to memory of 1804 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 33 PID 2076 wrote to memory of 1804 2076 b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe"C:\Users\Admin\AppData\Local\Temp\b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\82uh9pwf.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8190.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc818F.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp80D3.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp80D3.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b547ea610b5c086f0eb820c31a3bea4b31735ab26dcb64496379c19a7c3823bbN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD54b38a0c659551afff7b2164769966923
SHA18a14b92399c91588d7880c03e67ee175bb278769
SHA256718188b16dbf5d48fea4be0bfd5271dbc846787d03b626b39bb7f2b4f00f15dd
SHA512fab9e7e171bd831a47a9e90290eea0345ddfc48ade36b00c4fb49d7ea81fc1e3a404bafd4ec8f298ec9d6d15c1a9a3e226aa4d959408aedefb4eba88dc4ac35b
-
Filesize
266B
MD50bcdb658f3044ba96cf2f557b06a1937
SHA174cbc86e9a5cb95ea8135df7c7355b459c0e4911
SHA256b6b4a5dfb1ae29a91b87e850ade5ff8b3b59c7d6af49229702939191c6a5d3e6
SHA512946d2157bedd16d2aa9a64a3cbe032d65ee18bd51c4bf4e0191628371d3748fce07143cb3c64483dd8dfc5635ffbbd8cd13c94d1e82f74ba85dd384d04be2f0e
-
Filesize
1KB
MD5155468a2f55f31cc3cf6ae57d1e0496f
SHA1c5a8519f20157a2eab3203c2a4b64fba7819a928
SHA2565aae1c36db88e991574788e206d9b1e47a6fb301b83e26666c48b750aae4bb79
SHA5126d57d3490b072039c21f5e22ff1e0345b066959a037b388f9a50c2113e8cc981d44b9e535603bb811ce1156cca3ff337f847ee09256badda5e9a97532fc26c8c
-
Filesize
78KB
MD57f0951e823b10b29b3b469f1564bf833
SHA173695285b5d810a5ca7b09364333e4b4e5bc1100
SHA2566550b2cf47e9f76025af83c65bc19e37230d3698c80f4366de59841a49c4a3ff
SHA512e921f0a2871f8913dea78d6b5d91a00cf8fa37dc312d34d18dab147618dc134aad564d9863306a4d2853b04e1ab5dcdbbf1b19629048a34ebee7b07760c7f1e2
-
Filesize
660B
MD575a52caf48f5e41ee45a65a2ac6000e3
SHA15d953fff2ddec9867b997f9248d19a9ddcf4bf51
SHA2563e97d06ae6777c254cb1654a6b79091061bef780b59938f7d1d7cea387cf7389
SHA5122e9bb7718878f30d2a43ae6a36d5ac3463e8e5a9aee8d7aa553dd9099d4e481465162ff00a62ae35ef4ef102f9329ca546655fb25244a4fa62b778074cbd9b7c
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c