Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 11:17
Static task
static1
Behavioral task
behavioral1
Sample
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe
Resource
win10v2004-20241007-en
General
-
Target
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe
-
Size
78KB
-
MD5
d4b315d9874a3aa8f9fd98b14eca2206
-
SHA1
431ff598d7882074480500320b252c2d1b3824f5
-
SHA256
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166
-
SHA512
53a86e36d3a7be8b79377b3b6fde04edd4d437c41a97107ca68bbd3fa59ef51f62b96b4d126fbb8de5d087ccb339acb1e14c787418a8bcb006731de354212841
-
SSDEEP
1536:FuHY6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQte6Q9/51gTt:FuHYnhASyRxvhTzXPvCbW2Ue6Q9/Gt
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
Processes:
tmpB9BE.tmp.exepid Process 2768 tmpB9BE.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exepid Process 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpB9BE.tmp.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpB9BE.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exevbc.execvtres.exetmpB9BE.tmp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpB9BE.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exetmpB9BE.tmp.exedescription pid Process Token: SeDebugPrivilege 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe Token: SeDebugPrivilege 2768 tmpB9BE.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exevbc.exedescription pid Process procid_target PID 2312 wrote to memory of 3044 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 30 PID 2312 wrote to memory of 3044 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 30 PID 2312 wrote to memory of 3044 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 30 PID 2312 wrote to memory of 3044 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 30 PID 3044 wrote to memory of 2640 3044 vbc.exe 32 PID 3044 wrote to memory of 2640 3044 vbc.exe 32 PID 3044 wrote to memory of 2640 3044 vbc.exe 32 PID 3044 wrote to memory of 2640 3044 vbc.exe 32 PID 2312 wrote to memory of 2768 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 33 PID 2312 wrote to memory of 2768 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 33 PID 2312 wrote to memory of 2768 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 33 PID 2312 wrote to memory of 2768 2312 e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe"C:\Users\Admin\AppData\Local\Temp\e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tm8ixi5y.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBB16.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBB15.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpB9BE.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpB9BE.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e06388b5872b21ec2caf79262d73366f575dd46f7971ed0218df491e58c92166.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ae92dd1ad4ee91d104f39414c34bfd63
SHA16d4f1c612ffb984f5400982d139f00fd1d80ff5a
SHA2568fa72dc15ce40eefed9d940dcdd1626fe58d1c2d36dd5235b73895e0a2a755cb
SHA512656e20136aec0b736ee059fb13a0979def3d68c87c527170d04a7fca0f8c1318fe625bec662d6060567db626c9898e20fb33b1563d1611a1b5bc937ccd616c00
-
Filesize
15KB
MD5f617a0b2955106225de01d3519e781d6
SHA1ed3779a0e6dacdd35309a8a73f9b7d865c051b86
SHA256b2e4cbc7c12e7e5b24c6a91d3e899ff8c99d63c9f53dc64f28d66ed35fa92afe
SHA51238c7b6d48d55bc5601e381b61b3d0d7413e8553e2355465686bfbd42935c65a566c4901da3004d91226120a408b2c438bf630ce578ba7fecc2a1b702ca44f503
-
Filesize
266B
MD5ce63dcf68258961a86e90c95c23efbd9
SHA112d8a7a87ff4704105ffe13c4113b2070330a313
SHA256a618f3769f323e4cc3a5bb3556736b0a0a3d2757169a19fc908089b108e157a5
SHA512642b8dd0a6b00b42a93258d5cacc2d9f8a00be076974e789eab417a4302a762b09b4646956757a8f7433677dee0f993c5c0723c24ddd3a0de592b458f546651c
-
Filesize
78KB
MD5fa9bb8b30f8197ff099ba4b0c22150a3
SHA12fa5a2d4df4ac710b89aafbc34440ccb9912bd2f
SHA256e16e3f102adeaf1849501508376c04e78cc2ff93e139860e12d95b99ce4ddc14
SHA5129af7b5fdf5a0a9b2d499507caf0dc2e784b7be7303b451257193ec1a68cf357421868ca03ed58928cc7dd7461783ca5ff3379939ad16bb62320d39c559d6cdf0
-
Filesize
660B
MD58179d0a2065c6a27e77b3b562a7630ab
SHA1f77c76d041e15f38c91d012d27da90999f2d5957
SHA256619d3854ae8e9d4346a14626d88cdf5b1155d32831db0120c118d57d94e7ef93
SHA5120a938f6d1785070321730e0d1675c9cdec313aec090bb09e4eb0f4e63e1621324fac67e5c7f20a1ae5605bd7924e09bd1672246e2b45f131a5849b433bb9508b
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c