Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe
Resource
win10v2004-20241007-en
General
-
Target
07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe
-
Size
78KB
-
MD5
e5a28cec78d365832ad8dbb0ba37bd6c
-
SHA1
6797a971726d0528646c0a2c25398550d582af81
-
SHA256
07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff
-
SHA512
232b9719b281fb92e19f1405004c29cc91f19288166e0176465c52ece3e01ffd3b0a8818becefce01f65d18a0b86a0d6fc008b1ac258c3205e36800199a91329
-
SSDEEP
1536:ptHY6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtRU9/jA1kdg:ptHYnhASyRxvhTzXPvCbW2URU9/Ng
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe -
Executes dropped EXE 1 IoCs
pid Process 3368 tmp9B75.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp9B75.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9B75.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 532 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe Token: SeDebugPrivilege 3368 tmp9B75.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 532 wrote to memory of 388 532 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe 83 PID 532 wrote to memory of 388 532 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe 83 PID 532 wrote to memory of 388 532 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe 83 PID 388 wrote to memory of 2204 388 vbc.exe 85 PID 388 wrote to memory of 2204 388 vbc.exe 85 PID 388 wrote to memory of 2204 388 vbc.exe 85 PID 532 wrote to memory of 3368 532 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe 86 PID 532 wrote to memory of 3368 532 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe 86 PID 532 wrote to memory of 3368 532 07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe"C:\Users\Admin\AppData\Local\Temp\07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ptub7ots.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9F2E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9879102D2EDC43D38A2150F95FDD255B.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9B75.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9B75.tmp.exe" C:\Users\Admin\AppData\Local\Temp\07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD553f336c3f63e3abaa4812b84a00b8ad4
SHA1cee966eaeb06a4aaeace571e05e6866f4b5cf25e
SHA2562eafc85129de2f8a437043233f2ea7a82dae89969cdae59bb74919bbc86a96e7
SHA512721fa0e0f5c280efd5463d416577b309c2c1501e17e4897d7e659722f62021fb7592f879b5b34d8e88e862a5d80b25efc77af04af389a5b972c818501921edbe
-
Filesize
15KB
MD50926278ab68b4045c04dd9c721fe172c
SHA1e665496ac95b93332b2445dd14c9fbb9234c2065
SHA25645a3675d157f19372edaad6b2a4535a6ac322ac07239359af14fb1b5103dc0a3
SHA51297673160c28d7302a3713b80bdb6b6116ca4dbde69dbdab76139d1d671d563be89e9a5d129809a3cbe5b5a386ea644c2504366fb794946316cbfa123ef0d40af
-
Filesize
266B
MD5670e7b80111a0ed91624fc374c337b40
SHA1950b97a1fe47c8984b8c08da3c2a1ff98fc6f87b
SHA256b1de09144d3e45bc148a243addae1fc984f4c8d7c7606944a87f27b5e0b09405
SHA5129963541a9f61565c05875cd3a1756ce30eeb4bc4eb1b3b5c75db0b0caf79cc9ef4f4a19724fc4977b5ddc686bd4d4e2ffeaa18e2d410e3f32b21e554066c824b
-
Filesize
78KB
MD586d89ffae63780ac585bac1016167ddf
SHA1506ec2e23a8f4c46a309ff7433bddc54eb016ad6
SHA256a5bf15e9921fddf2ed175518d1c6a024009e9fa90326aa6f2d79460b3a24c4f6
SHA512ac28284b6e98c2348ce11265ef12086cd870edaf5e8f18727454079487a7d317d92b2de2bcae7757d4efc4e2d6d4bf65960ce30df75651558773cbbdd460f6e7
-
Filesize
660B
MD536193c9de8de6c2ab48ec38ff599298e
SHA12da2fdd516cf00a236bb89ebb171ad05403c0acb
SHA256667349e1b5add887cff9465baa7ffe32534f8ae686d1f2eaea44c913600cb7d1
SHA51263e4f96f37d41ee468cdd9c2d458d736f02f4f5e2cbaef6ceecf35c986dd7c74437e99f4870c375f26f5e22225d5010fdc191f4083bc6ff9f43ef50ebdb33a3c
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c