Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 10:10

General

  • Target

    c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe

  • Size

    78KB

  • MD5

    ee9a0126b812ef31dda0d48125dd8980

  • SHA1

    b740ceaffd43330544e45c0c9242239133d07eb8

  • SHA256

    c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247d

  • SHA512

    1a2e6031e6aa306b1822e71c0b94f857786ffc569b7244a24376b440306a3209b219a9f122a03dcc7ad55c978539dad76e38fff74641a277c84351d78ef3018a

  • SSDEEP

    1536:ECHF3M7t/vZv0kH9gDDtWzYCnJPeoYrGQt1p9/K1Li:ECHF8h/l0Y9MDYrm71p9/1

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe
    "C:\Users\Admin\AppData\Local\Temp\c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\geq9_l7d.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3240
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES92BA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc579C2A28DEC3453D831D8310EF5F712D.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3152
    • C:\Users\Admin\AppData\Local\Temp\tmp91A1.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp91A1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES92BA.tmp

    Filesize

    1KB

    MD5

    dd1231449795845ae6559034dae85a3d

    SHA1

    4437a83bf09973c49a9f0d53718764e73b1e87b9

    SHA256

    89c4966e9d2c325ec3a6304bf972531a4661edac21cca45c1a3df17e4d90ad7f

    SHA512

    4d9b9c4df737fbeb57fcddb527e3035095a0a6143bc2e584d94003eeb7d590a54858f0648fbaca2edc84c6c48f235dc1bb6d465d87ef2949e49abce8a7ef4bad

  • C:\Users\Admin\AppData\Local\Temp\geq9_l7d.0.vb

    Filesize

    15KB

    MD5

    a75026f4519889d324a2e867ca7ea03e

    SHA1

    2ebbba0629bb97bafbe3cb8845273e3054e7c1ef

    SHA256

    49d225ef17d46ce6f94e45bf08d913ac17de499e2a9919a10537f9a9f47374ec

    SHA512

    faf2cd944561f761dee48a521f1a9b243c01ecd64a2d5526207eb53a3275159750eec78969cc92a1e73dfd39caa65563deeab207eac67e9720f84393b9654e43

  • C:\Users\Admin\AppData\Local\Temp\geq9_l7d.cmdline

    Filesize

    266B

    MD5

    d642e619a567142b1f1cec28bf87de02

    SHA1

    bea38d9b06cefab6fb6ed31a6b091bb1d5dbefd6

    SHA256

    74634a2e8eba608a2cad1deac66e6dfa33629d9f7e635ea4242553abd6c22187

    SHA512

    c05d8234580a6e6a9040917fa6e059e1c73d3dd70ae9d634607fda2810c2ba7e75a19b210bd38460eb6a657963adb7303791485da8adc77eb1a50d17e70b74ea

  • C:\Users\Admin\AppData\Local\Temp\tmp91A1.tmp.exe

    Filesize

    78KB

    MD5

    3e51b385a2d8b88543b75c5b52018097

    SHA1

    214fd7eece72255c756e14149443b8055545edd3

    SHA256

    b7876012bcab6739aba2c18d08021d48fe737b787f1bab6e7802c248ecc00d6e

    SHA512

    e0219982df6c9077c8f55b52eba3fdc79315272684c2d928839923eb82a50fb72bf05b98b6f35db00a2a87dafd755d3daf08f580609ea20299ddfa230591f721

  • C:\Users\Admin\AppData\Local\Temp\vbc579C2A28DEC3453D831D8310EF5F712D.TMP

    Filesize

    660B

    MD5

    c4609ef4e02e841d98dc1075e95a761c

    SHA1

    2e085f30bd21f45017592e892d50ddcbc943a663

    SHA256

    ffa45b04e46c38dc076880c6f92bd646f29677dafbdc35ef2feaa3f3298e2589

    SHA512

    cd5afd51b20649620d207b740d2fd4e92607b0fdd88eddb8033144d5f4e79d4d6561fb653859b49ce86289d4deedfa128df582ece8ef3faaaab2f7d54a468034

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/1248-25-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/1248-29-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/1248-28-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/1248-27-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/1248-26-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/1248-22-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/3240-9-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/3240-18-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/4476-23-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/4476-0-0x0000000075272000-0x0000000075273000-memory.dmp

    Filesize

    4KB

  • memory/4476-2-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB

  • memory/4476-1-0x0000000075270000-0x0000000075821000-memory.dmp

    Filesize

    5.7MB