Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 11:33

General

  • Target

    25761531a6c9f37c50e63396c649dd490eac73e65d8fbb1e67745669994202ee.exe

  • Size

    78KB

  • MD5

    bd1ef45cff3312a07216bd88378d4d20

  • SHA1

    f4acabccf822f489b55041ab0d3208ac2a862796

  • SHA256

    25761531a6c9f37c50e63396c649dd490eac73e65d8fbb1e67745669994202ee

  • SHA512

    21e63d9035eec796a1a477fd742aebe4302369d304380999dbd9ffe1ffae5398813be487b21576428dfb0add3cc3742d109bbfe1d26e3dd39c445c04150e8cf2

  • SSDEEP

    1536:RPWV58AXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN619/to1QEQ:RPWV584SyRxvhTzXPvCbW2UG9/tAQ

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25761531a6c9f37c50e63396c649dd490eac73e65d8fbb1e67745669994202ee.exe
    "C:\Users\Admin\AppData\Local\Temp\25761531a6c9f37c50e63396c649dd490eac73e65d8fbb1e67745669994202ee.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sj9j9yoe.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES70AE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc70AD.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2540
    • C:\Users\Admin\AppData\Local\Temp\tmp6FB4.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp6FB4.tmp.exe" C:\Users\Admin\AppData\Local\Temp\25761531a6c9f37c50e63396c649dd490eac73e65d8fbb1e67745669994202ee.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES70AE.tmp

    Filesize

    1KB

    MD5

    fedae98c72464d01f3dd81b7ba59fa69

    SHA1

    77d0895ee30e8fa3e1cb214caeff8e6d892f6773

    SHA256

    d351db732ef99ac286f6673c24f62a7164bad39bd6a73df142a7f3b0c71a9134

    SHA512

    b3c812df127d75cfae92d7dbe1b041640d3019305c63db2798c2c3ba3998391f17a1ae6e082f9f5385f452f251f21be8dece3bc1dd017185f4f8cf7d2777bb0f

  • C:\Users\Admin\AppData\Local\Temp\sj9j9yoe.0.vb

    Filesize

    14KB

    MD5

    0c8dce65c78f5f9724d6ab5a1aa0bace

    SHA1

    6dcddf9b59266d5bbb99b5b24ae47cdfd65bba5d

    SHA256

    867ea6b2842359d97e0f67f7dbcc1106c2622a0b106f62843c1e0021803a3ba6

    SHA512

    784db5f6581f0931f54123c7fbbb69a31b0c01bfcb98aeb098bb7ebfd4d4d6e77b523f63b7e1130e2c4863881c3d1a97a95057c64abcdb8eae2065b6c74e805a

  • C:\Users\Admin\AppData\Local\Temp\sj9j9yoe.cmdline

    Filesize

    266B

    MD5

    8233892588f946fa2254e7721715433c

    SHA1

    27f6451ee244e79caeece0f1d163dd72ba5a3b96

    SHA256

    8520a27f5e80d35e7d1fa7dba97d283f76a202c4917ac4b9e2b36c46c38963bf

    SHA512

    439d4a3ec43c80ec84caa1fd34f9155af75589efc22af422c61eb91b0410c5dcfb3d842e25f2cf37d31c28e8e2488aef432a66115a8ec459bf1aa893814246e7

  • C:\Users\Admin\AppData\Local\Temp\tmp6FB4.tmp.exe

    Filesize

    78KB

    MD5

    67bf23f9bf030a2902ed53a8bea8ab62

    SHA1

    bf883f7236a9d78ed616bc7bf004911f08d22e1e

    SHA256

    b3a01e6cae64682d9d1ccaa5904206462771bcc9ed8daf1d7542dc3e5d5972a5

    SHA512

    3f11ad6d8e328a3019be9936fbb21490f1b843cd7db01780cba1866836c2edf37eec5d5e7758e4bfd9509607926834d7d519b97168a0882e95bb6c8069f46c54

  • C:\Users\Admin\AppData\Local\Temp\vbc70AD.tmp

    Filesize

    660B

    MD5

    9a591ad4c00284194aff51cb031d0ff2

    SHA1

    a7280537dc96ebdbf81d3e223d2469e4b9651392

    SHA256

    266220cfb6fb68e6036bff1cdf316874f2a4452970546fe697fe9abe870cb7a1

    SHA512

    f632065a99a9b09bf63812afe14c79bf71ea0e3034a59900a0040afc1fd992e68c5e00660d9b2dd329c8abd5337bca06e887b5fd5441a07b1f87aa70ea4c1884

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1040-8-0x0000000074D10000-0x00000000752BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1040-18-0x0000000074D10000-0x00000000752BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-0-0x0000000074D11000-0x0000000074D12000-memory.dmp

    Filesize

    4KB

  • memory/2236-2-0x0000000074D10000-0x00000000752BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-1-0x0000000074D10000-0x00000000752BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-24-0x0000000074D10000-0x00000000752BB000-memory.dmp

    Filesize

    5.7MB