Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2024 05:05

General

  • Target

    03109a8f0dd82913b5735c298fe4c3045a981e8c8b7620e1e02bc26b4e9f23e0N.exe

  • Size

    78KB

  • MD5

    2a433f26e2071e9959eafa90ee2836c9

  • SHA1

    140e058d784bdc39ed3da222299dde870947a9f9

  • SHA256

    65e26c028e2fc8195573c4a1e27469ede9bc3d37ee6720c619dd19b857754df0

  • SHA512

    c2a7e0b19b38b6da0a36cb7fcc06a95956a33fa355a7da97bcc74138e5bcec1e1435edda023ba510a00beb0b7ef89d3ae8c39c764291914be46dc434e9060c60

  • SSDEEP

    1536:Qy5xpJywt04wbje3IgTazcoOEEQLwdCRoaeuProYMHQtd6z9/m1oxi:Qy5HJywQjDgTLopLwdCFJz49/Xi

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03109a8f0dd82913b5735c298fe4c3045a981e8c8b7620e1e02bc26b4e9f23e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\03109a8f0dd82913b5735c298fe4c3045a981e8c8b7620e1e02bc26b4e9f23e0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lpc1po2i.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES36AB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc36AA.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2248
    • C:\Users\Admin\AppData\Local\Temp\tmp35B0.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp35B0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\03109a8f0dd82913b5735c298fe4c3045a981e8c8b7620e1e02bc26b4e9f23e0N.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES36AB.tmp

    Filesize

    1KB

    MD5

    ec17e0bf2101d8351f0a6e39e00deea8

    SHA1

    c3c907bfcf8ee3f983b4d769c71152ef268df3c5

    SHA256

    3aff0769db386bf9d88015e2af9720f75ac60bc155cb57aa0e015e032079f60c

    SHA512

    262d0497d3f23e30c4b11f0138f71dd13e880152cc4bd794fefbf8a839107c106c5c3c6b5c38fa68c7fa76040afa744e49ea916217bdb31389f3d4600ddf21bc

  • C:\Users\Admin\AppData\Local\Temp\lpc1po2i.0.vb

    Filesize

    14KB

    MD5

    3d52541c313b210652f67b769cc1de1f

    SHA1

    c90566feb1945547ac60d19ef803dc0dc00d1296

    SHA256

    8c2c8ab40a60ffc7dc56377b808fcf639e73f9f03462dd5eddb2500db3b55ced

    SHA512

    791a8f528170c5be1741e4a180bad25f7b0ff084e1074f4db87babd8463b63529d11349a47244bd23d4e620206757fc74cee1ea6df36e18d15984ba83fca1dc8

  • C:\Users\Admin\AppData\Local\Temp\lpc1po2i.cmdline

    Filesize

    266B

    MD5

    8e9bd1d87795d78f555d630adf155f8e

    SHA1

    3aaf72e5722093d38a1507e0b6881bfb61aa3279

    SHA256

    093852a1fa5ced1b46c895329a8b53ae029aba2ea0afaf005b02b56ca57c4477

    SHA512

    fbd5e5c3d7f7ebcd4c3c6ccf7b19248d811efbdf938cba661506cb2e960d52cee8fb3ba23daac386be55f48442c2b4a014395fe3e0df4f90182ecc417557c351

  • C:\Users\Admin\AppData\Local\Temp\tmp35B0.tmp.exe

    Filesize

    78KB

    MD5

    5d26ed53990aeebd78628efddfce408e

    SHA1

    63bb0767bf8c5cc5200e8e2cd7c109a9b40b5306

    SHA256

    911da36d10bbd3dd9e1e45fa47232d9f54c84c534e85dd0f60afff2bb9584624

    SHA512

    eedec257421b37498d69a85e1621b2857ac3aab671971be926f63560b32a47a9137476f35b0dea0a30627a0251e27c29db71aab9cb5ac426f19093a097638c2b

  • C:\Users\Admin\AppData\Local\Temp\vbc36AA.tmp

    Filesize

    660B

    MD5

    50a146dd85b9858ad6c5a9fdc83e1a6d

    SHA1

    38ab95343094138acf65f214d9944cf2e149caef

    SHA256

    3f724c6da41505fce154dece94f3a020f34c7ba761886ab22873aac2461e2cae

    SHA512

    5ca89c482e344d0f354718964cecf8c8b608c1bfa1fba573361369dd9769bddea6f0980fa5d7cb988bf81a2784bee3f6725c67e4869785601eb7b1f8ae86cccc

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    484967ab9def8ff17dd55476ca137721

    SHA1

    a84012f673fe1ac9041e7827cc3de4b20a1194e2

    SHA256

    9c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b

    SHA512

    1e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7

  • memory/656-0-0x0000000074EB1000-0x0000000074EB2000-memory.dmp

    Filesize

    4KB

  • memory/656-1-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB

  • memory/656-3-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB

  • memory/656-24-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB

  • memory/2928-8-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB

  • memory/2928-18-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB