Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 20:08

General

  • Target

    6765cc7ecc6f99061f89941cc280d206b0142667ee26d3852096ca1443e635b6.exe

  • Size

    78KB

  • MD5

    64ede25968eaf1d786944fb8dd60134f

  • SHA1

    02ede7184de208287c61e509b7b93c5e3b57fba8

  • SHA256

    6765cc7ecc6f99061f89941cc280d206b0142667ee26d3852096ca1443e635b6

  • SHA512

    a875bda5f5d432ec2b80247c6ae52e92ff7dc9c89a256026521347f9c41659e84637b20174aeb590f5e51d259c4491a50900b0ec3555bfc65223450d70e74633

  • SSDEEP

    1536:+y5YXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQt96l9/ej1Dr7:+y5gSyRxvhTzXPvCbW2U+9/W7

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6765cc7ecc6f99061f89941cc280d206b0142667ee26d3852096ca1443e635b6.exe
    "C:\Users\Admin\AppData\Local\Temp\6765cc7ecc6f99061f89941cc280d206b0142667ee26d3852096ca1443e635b6.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sdhppghd.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB268.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc815C5FAE8C4849139714BD07CA9FA3D.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3896
    • C:\Users\Admin\AppData\Local\Temp\tmpB0F1.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpB0F1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6765cc7ecc6f99061f89941cc280d206b0142667ee26d3852096ca1443e635b6.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESB268.tmp

    Filesize

    1KB

    MD5

    87ffd55f348f9df3c8bfb64cecf7e41c

    SHA1

    0a5cc8cc46a0c437a341b54ffcc279e4527e64c4

    SHA256

    9e457525405e6e3607dfa676bbdeffe9063a1cc52a779e173a09874ea92a8b76

    SHA512

    9844122c90858943212a119a03ae770113a651aa49b421ef49078b765ecc73a5a0698a1f79e65d7f34a1bd35be8ee85ba63e9938d37d861b174df3dfff110ccb

  • C:\Users\Admin\AppData\Local\Temp\sdhppghd.0.vb

    Filesize

    14KB

    MD5

    da2b3b696775bc853630b893d7c4edcb

    SHA1

    2b0a081256b6e882cd0d5dde1c5fd5be34e01d14

    SHA256

    75b3fa4a0ed1fa621b88fe0d35b2ecf2922aa4d0ad8cb0580b6e5154c3222a15

    SHA512

    582d1c19bb930275132fa4a65126760251028dac19ae9d90cf8e68fa29c98c2e135cfbba8bb4b222e91d62e4fdb287778fee0ad58a19cc9f2855e87b69eb3a2d

  • C:\Users\Admin\AppData\Local\Temp\sdhppghd.cmdline

    Filesize

    266B

    MD5

    5ca00da4c46760c173a584c1951384a3

    SHA1

    42804c9dd317874b0a41f3b1c5504517be3fd3e5

    SHA256

    0e3a57c2a3eb0d0114e5ed4c4118bfdf40c85c93592c41ce810715ac10c78696

    SHA512

    3216c927afdb94d87e30c871b49dd52cf6375cf170f387052c90f3b4becc23aebce0c587e73d472ea9235ab9ea756dfa2e99146ec5c921e622cdcfae9e4e97c9

  • C:\Users\Admin\AppData\Local\Temp\tmpB0F1.tmp.exe

    Filesize

    78KB

    MD5

    3c1f7535d81797029f27acd809aad1f9

    SHA1

    19b27b9628ae2936700ab0f9447cc1dcf686e2ad

    SHA256

    5b52e15107c0009aaab058fd830072b9f002e4123449d8955ce74748c96fb032

    SHA512

    2b37d4da72346ede9030ab3c9fba60e12869d60d8de1bd6336371b3809fb912ec7658948b133a9da0fffaf437857705794b4823160f9d746f75b8eac662062e4

  • C:\Users\Admin\AppData\Local\Temp\vbc815C5FAE8C4849139714BD07CA9FA3D.TMP

    Filesize

    660B

    MD5

    862ff94de3139745da0f45f6478546a9

    SHA1

    aca5f56f1ffbe4d668e1b23952faf49caf2a1bd4

    SHA256

    b878024b64d5d78d210301cd34f337b86a2e966da0eddffe1264cbe2bf73feb1

    SHA512

    071d988abfc38acb592d9a7df94b60b384d4ab9db816ba450a85cfadf7f7903f196c4b29e2bcaf9f4e6a069bf84d25c0b7610b05b1f3d99216896bc42d129a9f

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/3420-0-0x0000000074A02000-0x0000000074A03000-memory.dmp

    Filesize

    4KB

  • memory/3420-22-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-2-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-1-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4280-23-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4280-24-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4280-26-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4280-27-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4280-28-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/5008-9-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/5008-18-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB