Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2024, 22:49

General

  • Target

    07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe

  • Size

    78KB

  • MD5

    e5a28cec78d365832ad8dbb0ba37bd6c

  • SHA1

    6797a971726d0528646c0a2c25398550d582af81

  • SHA256

    07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff

  • SHA512

    232b9719b281fb92e19f1405004c29cc91f19288166e0176465c52ece3e01ffd3b0a8818becefce01f65d18a0b86a0d6fc008b1ac258c3205e36800199a91329

  • SSDEEP

    1536:ptHY6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtRU9/jA1kdg:ptHYnhASyRxvhTzXPvCbW2URU9/Ng

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe
    "C:\Users\Admin\AppData\Local\Temp\07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ptub7ots.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:388
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9F2E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9879102D2EDC43D38A2150F95FDD255B.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2204
    • C:\Users\Admin\AppData\Local\Temp\tmp9B75.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9B75.tmp.exe" C:\Users\Admin\AppData\Local\Temp\07bbf60bd5f17b7e7dc67c478cc626534dd7d270c4fff3e6ae5b869fd19ca7ff.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9F2E.tmp

    Filesize

    1KB

    MD5

    53f336c3f63e3abaa4812b84a00b8ad4

    SHA1

    cee966eaeb06a4aaeace571e05e6866f4b5cf25e

    SHA256

    2eafc85129de2f8a437043233f2ea7a82dae89969cdae59bb74919bbc86a96e7

    SHA512

    721fa0e0f5c280efd5463d416577b309c2c1501e17e4897d7e659722f62021fb7592f879b5b34d8e88e862a5d80b25efc77af04af389a5b972c818501921edbe

  • C:\Users\Admin\AppData\Local\Temp\ptub7ots.0.vb

    Filesize

    15KB

    MD5

    0926278ab68b4045c04dd9c721fe172c

    SHA1

    e665496ac95b93332b2445dd14c9fbb9234c2065

    SHA256

    45a3675d157f19372edaad6b2a4535a6ac322ac07239359af14fb1b5103dc0a3

    SHA512

    97673160c28d7302a3713b80bdb6b6116ca4dbde69dbdab76139d1d671d563be89e9a5d129809a3cbe5b5a386ea644c2504366fb794946316cbfa123ef0d40af

  • C:\Users\Admin\AppData\Local\Temp\ptub7ots.cmdline

    Filesize

    266B

    MD5

    670e7b80111a0ed91624fc374c337b40

    SHA1

    950b97a1fe47c8984b8c08da3c2a1ff98fc6f87b

    SHA256

    b1de09144d3e45bc148a243addae1fc984f4c8d7c7606944a87f27b5e0b09405

    SHA512

    9963541a9f61565c05875cd3a1756ce30eeb4bc4eb1b3b5c75db0b0caf79cc9ef4f4a19724fc4977b5ddc686bd4d4e2ffeaa18e2d410e3f32b21e554066c824b

  • C:\Users\Admin\AppData\Local\Temp\tmp9B75.tmp.exe

    Filesize

    78KB

    MD5

    86d89ffae63780ac585bac1016167ddf

    SHA1

    506ec2e23a8f4c46a309ff7433bddc54eb016ad6

    SHA256

    a5bf15e9921fddf2ed175518d1c6a024009e9fa90326aa6f2d79460b3a24c4f6

    SHA512

    ac28284b6e98c2348ce11265ef12086cd870edaf5e8f18727454079487a7d317d92b2de2bcae7757d4efc4e2d6d4bf65960ce30df75651558773cbbdd460f6e7

  • C:\Users\Admin\AppData\Local\Temp\vbc9879102D2EDC43D38A2150F95FDD255B.TMP

    Filesize

    660B

    MD5

    36193c9de8de6c2ab48ec38ff599298e

    SHA1

    2da2fdd516cf00a236bb89ebb171ad05403c0acb

    SHA256

    667349e1b5add887cff9465baa7ffe32534f8ae686d1f2eaea44c913600cb7d1

    SHA512

    63e4f96f37d41ee468cdd9c2d458d736f02f4f5e2cbaef6ceecf35c986dd7c74437e99f4870c375f26f5e22225d5010fdc191f4083bc6ff9f43ef50ebdb33a3c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/388-9-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/388-18-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/532-22-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/532-1-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/532-2-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/532-0-0x0000000074DC2000-0x0000000074DC3000-memory.dmp

    Filesize

    4KB

  • memory/3368-23-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/3368-24-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/3368-25-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/3368-27-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/3368-28-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB

  • memory/3368-29-0x0000000074DC0000-0x0000000075371000-memory.dmp

    Filesize

    5.7MB