Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 21:56

General

  • Target

    8d9735e44206c9745f4d702d3dda9a2d1ca43698834c65fcba6ffe46de53e986.exe

  • Size

    78KB

  • MD5

    6aaa8712e3a827682516810fe4519f77

  • SHA1

    a660917f9c7caec977de9f93bf8ace9ec7fddedb

  • SHA256

    8d9735e44206c9745f4d702d3dda9a2d1ca43698834c65fcba6ffe46de53e986

  • SHA512

    733215a309c7d377a284b3e4c29d0c089c62cddf08bd50a19d391eba1648a5b060cd5e86989d630dca04fedeea4b5e3553049e15428ae35271112bff3e17c899

  • SSDEEP

    1536:RtHFo6uaJtVpJywt04wbje3IgTazcoOEEQLwdCRoaeuProYMHQtR9/QQ1X1L:RtHFoI3DJywQjDgTLopLwdCFJzR9/QsL

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d9735e44206c9745f4d702d3dda9a2d1ca43698834c65fcba6ffe46de53e986.exe
    "C:\Users\Admin\AppData\Local\Temp\8d9735e44206c9745f4d702d3dda9a2d1ca43698834c65fcba6ffe46de53e986.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bfgg0m0q.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA3BF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA3BE.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1740
    • C:\Users\Admin\AppData\Local\Temp\tmpA257.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA257.tmp.exe" C:\Users\Admin\AppData\Local\Temp\8d9735e44206c9745f4d702d3dda9a2d1ca43698834c65fcba6ffe46de53e986.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA3BF.tmp

    Filesize

    1KB

    MD5

    9a2f21145371dada310542336dbac198

    SHA1

    ea4d44924f855cb35cb128555648084456532167

    SHA256

    c6566de655e1eeddd06e0453a2af775eed142cbf0613e60716a52485f3621367

    SHA512

    bc7ea332444546f4d1355f64bbf69c3a178765d7f9996f638b55f3ef41daa360dbc33e6ce5a20f515eccff02f030f00612d7937dd88c069a59da73d51967f908

  • C:\Users\Admin\AppData\Local\Temp\bfgg0m0q.0.vb

    Filesize

    15KB

    MD5

    7863af986df891a2a40eb05c2170e9d3

    SHA1

    1800b36acde027083fad72e568adf3169cc950b2

    SHA256

    09dc4f389fd59e89168f7e05a8ad128c730532ec599c659be3b408c5fe61a95d

    SHA512

    6cf995fbf517b121f4e2d3cc4b43434a307b0bae3d43cd02f85f2117dbf6d388208b6e76eece9cb192188c1b7e5fb131e6d9b78e16c04c38316bfde9ff734209

  • C:\Users\Admin\AppData\Local\Temp\bfgg0m0q.cmdline

    Filesize

    266B

    MD5

    5e9c608682d76e8e7124e17c3a6d0ee1

    SHA1

    007122452b656427fe27fbf205d9f214a13cb6c4

    SHA256

    0a965d4331b85cf9547bf7540303a7bc80d4b999635ce7664870d41d09fef465

    SHA512

    2fae0776d8284599ca3245f1766d2562a91004607bc5f97e3b7566beccafb987ddfbdf2b02370d1d1a4b4ad67659173e353e5947a95037e51f5b23cf84132242

  • C:\Users\Admin\AppData\Local\Temp\tmpA257.tmp.exe

    Filesize

    78KB

    MD5

    058697c056005d280ccc6f1376385f49

    SHA1

    88e0979a8542e7beb4a84def96289c23acafdb6b

    SHA256

    6cdccf64d8b30c42ce5efcf147956b41f7d694b4f20b9d208136bccabddeb430

    SHA512

    80de32fac5e16b278175ad587ea0af9fb133dc5d1c305a0ea4f0336a176c6a6f5eea9e8ae703ff16b3d8dd28201c31217f830f6ad4b79ab1f22f5fdf5586f40e

  • C:\Users\Admin\AppData\Local\Temp\vbcA3BE.tmp

    Filesize

    660B

    MD5

    c53242a98182a41b4ee310df2d03432b

    SHA1

    87b3c9759209fc3aea4376a1f9bb79192286f7ed

    SHA256

    1052d1d7866c71b38fc6dae38da1f638ffcdc95e594ed81f84baece026114574

    SHA512

    e99e5281eda5fdd9c902bc5b413f7a413a26cf99f36e159d7fbf0ddbeef613513b3a5a58c9392ba3aeddfdfc641b66b9e3b9ec059d64f5787bad278260b53b8b

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    484967ab9def8ff17dd55476ca137721

    SHA1

    a84012f673fe1ac9041e7827cc3de4b20a1194e2

    SHA256

    9c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b

    SHA512

    1e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7

  • memory/1240-9-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB

  • memory/1240-18-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB

  • memory/1452-0-0x00000000743B1000-0x00000000743B2000-memory.dmp

    Filesize

    4KB

  • memory/1452-1-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB

  • memory/1452-2-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB

  • memory/1452-24-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB