Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe
Resource
win10v2004-20241007-en
General
-
Target
0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe
-
Size
78KB
-
MD5
a5c2a36b2f195af30e26dd9bdbfc80f5
-
SHA1
054bc03c3aad9c30d5588fcae7bd3fb58d604b84
-
SHA256
0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934
-
SHA512
24f6812282a0d5db6e550db044cdf3843eabf6635053ad9db02c28b536aca8eb94c227a96376f086e6ffc1136ffd0b976b92bb18e2644e1930d812acd96a71c7
-
SSDEEP
1536:aXPy5jS7AlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti6K9/0A1/9:iPy5jS7AtWDDILJLovbicqOq3o+nC9/1
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2128 tmpAA05.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpAA05.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAA05.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe Token: SeDebugPrivilege 2128 tmpAA05.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2420 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 30 PID 2580 wrote to memory of 2420 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 30 PID 2580 wrote to memory of 2420 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 30 PID 2580 wrote to memory of 2420 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 30 PID 2420 wrote to memory of 2100 2420 vbc.exe 32 PID 2420 wrote to memory of 2100 2420 vbc.exe 32 PID 2420 wrote to memory of 2100 2420 vbc.exe 32 PID 2420 wrote to memory of 2100 2420 vbc.exe 32 PID 2580 wrote to memory of 2128 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 33 PID 2580 wrote to memory of 2128 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 33 PID 2580 wrote to memory of 2128 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 33 PID 2580 wrote to memory of 2128 2580 0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe"C:\Users\Admin\AppData\Local\Temp\0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zvggyrco.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAAC1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAAB1.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpAA05.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAA05.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0624df5cf869ba3214f4e94700a3da5832b4352ed9afa6608106e29c5d915934.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509001320a809550a5db6773756f4be5f
SHA14ae159db49fbae136ea9bf2ed3d9d138af9cb997
SHA256e404c90f8c9118da501b8c97494d5ba179d8ffb80a07d72b695531fcf9c7371a
SHA5127992ee27c6e2338ee4275bd364660c966ca4776bab019f43f005d9c68474937eda695a64c8ab2c19221406164cf406438143056ba7d707cf96e37e677312a0ea
-
Filesize
78KB
MD55a79657f86d4f5dca215a6b32ed79f09
SHA1cc2687643d2be25d2aba17f3caef00669ca31cf3
SHA2562af374eda5782ec18b5c5a3bfc9342547dfc94b269c0e5ed231706acd870ffd4
SHA5127cdccb53e464da77c25f9709689bf48139e17852834db5c563e723988f7af97b3c0055a8743eaaabb1f44ce379cd7264fc38197b2d0df0b3e9d02cca5daeee40
-
Filesize
660B
MD5a6a7c395d970b5aa355282014c5f1865
SHA1ed16545b69fd328dac7ab1a0219fb0ab8b810386
SHA2567869db8f2ca334bdd30c343dcf5b7f293ecea1ba8b0cde986113769c5829c65f
SHA512d708bc6c6e121370e3e7246c33518fa80990e8ad4488829f212784fd3042f35af249d12ee0a180e02f2901d4031b5c231e5b81bf09efe0592d104c7b809c7118
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
Filesize
14KB
MD5812e66f6f662d13b146c2c0de5b40315
SHA161ed92e6d760da3e00d59d21683886b8ea6f4a58
SHA2560f6de0e37a345f5f033e4a887408ec33170970350040856de50dcaefd1aa76dc
SHA5124b42a0e6ea95cc0e527aa693c66da84231591173cf97eb30b525eddc35d19dae05091ff5922b5cd982c47f59fbf6b402f56dd62681c32adf1a89a6338b69db0f
-
Filesize
266B
MD5a48f0603ca81749bd5ffdb37901e67a3
SHA12f08b23231232142298580e311bf2a723a803756
SHA2565f45fa840c778f2210f5a015a7d9e2ad72830fc71c53b435871b777fb0d561d4
SHA5129c81df4e4208392d04132ceca21b4d3bd9c1edabc40f5d941151f22ad0a2eea3d0799dc04370ff8b01104fc9674eca57d23464a3590b17db69e416066f948b8b