Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 08:54

General

  • Target

    0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe

  • Size

    78KB

  • MD5

    a5c2a36b2f195af30e26dd9bdbfc80f5

  • SHA1

    054bc03c3aad9c30d5588fcae7bd3fb58d604b84

  • SHA256

    0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934

  • SHA512

    24f6812282a0d5db6e550db044cdf3843eabf6635053ad9db02c28b536aca8eb94c227a96376f086e6ffc1136ffd0b976b92bb18e2644e1930d812acd96a71c7

  • SSDEEP

    1536:aXPy5jS7AlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti6K9/0A1/9:iPy5jS7AtWDDILJLovbicqOq3o+nC9/1

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe
    "C:\Users\Admin\AppData\Local\Temp\0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lbjh4z0a.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9BB3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9480CDC2D50A4350A0794FE7FB6F9.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1544
    • C:\Users\Admin\AppData\Local\Temp\tmp9AD8.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9AD8.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9BB3.tmp

    Filesize

    1KB

    MD5

    38f8b3f93278e78b339507e98e5531ab

    SHA1

    e7180f64218470eb1ebf6366099254d551b058eb

    SHA256

    8d4421d10d6bde66f48d9f41fbe7fb84f4ef8588e8b257991cf6bc5224e2dcab

    SHA512

    4ec62cae198d62fd3430a0e53ab87cbec4bfd336ec635fa3e416d56c31a9794614a5a6a8e684c138bb56240c2be7f0fe6aa6b229920391e952f9785d92f802ac

  • C:\Users\Admin\AppData\Local\Temp\lbjh4z0a.0.vb

    Filesize

    14KB

    MD5

    4051fc61a21b84820b3e47bdc5cc7629

    SHA1

    c92c2cec02f825c053e7a28f43ee5c6c02492d68

    SHA256

    df6603f587aac5e6edb4dcc672e4f51ce0b23ea26486ea1ebe0a5618a1e90f53

    SHA512

    fab58572d04aab76b585bc247ebb120c4e8733d7a29232401f5b0e3eb3743ed14b5de120a263fa4acec0d1ac9069ec5ab25446f0e7a36f6574ba7c21d3a74b90

  • C:\Users\Admin\AppData\Local\Temp\lbjh4z0a.cmdline

    Filesize

    266B

    MD5

    aa1b62d2dc4ac18c0dafdc509ead813c

    SHA1

    68c2511ceaa66484139ebef3ce42bed8eba32293

    SHA256

    312b434e496cf7fb6fa85e6769d00d5eb4938d69a88b8393b094f3af35d4252f

    SHA512

    078e12e2af5fb6a12dfa2c0234eb5d88c0bf8316d28451f4e8de42a4243091d608dd58bce5a3ac3009a5716c64b4f230685ece433b4f8a5d097b003114f53443

  • C:\Users\Admin\AppData\Local\Temp\tmp9AD8.tmp.exe

    Filesize

    78KB

    MD5

    037b73fec958fa7510cff8a33a127e0d

    SHA1

    795e7b48ce0a2d1057f097954b9673ead260ed97

    SHA256

    7fc80033180d4dfb25dc4aed8f654360ab28fe6e4e56f54d1208fbebbb17c18b

    SHA512

    54afd214b521172d4911f7cfa337030b74af2385ca05adff8639d89bc00dce14bb7143c363bd2dfd2fdc6e90121ff445ff8d82ce15341583c610293891890a1a

  • C:\Users\Admin\AppData\Local\Temp\vbc9480CDC2D50A4350A0794FE7FB6F9.TMP

    Filesize

    660B

    MD5

    55254d869b24f7200ee90e115f8ae79a

    SHA1

    5be4fea614b3b483830af0fdd47103f2fb8e672f

    SHA256

    935ceb1e65b2993c3e0c16d0b2142c05b3f4d6dbebf4d89e037043ce219ee838

    SHA512

    8be648f75fc53df76db1d18fa660c168c79fa8ca95c806719e3da4b09035a29cbb21197d6ee01b1bb42bed5e5890430a671d34559f32098026f9af7de9d89208

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/2508-8-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-18-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4264-23-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4264-25-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4264-24-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4264-26-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4264-27-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4264-28-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4624-0-0x00000000747C2000-0x00000000747C3000-memory.dmp

    Filesize

    4KB

  • memory/4624-22-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4624-2-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4624-1-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB