Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 14:01
Static task
static1
Behavioral task
behavioral1
Sample
226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe
Resource
win10v2004-20241007-en
General
-
Target
226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe
-
Size
78KB
-
MD5
8ad0faf2117b5ea58903139c5a313730
-
SHA1
389e93dce3d28ec65cd75a1baab5e4d05fee0dd0
-
SHA256
226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48d
-
SHA512
08f040979c0014c8f3760e3f84be2accf1bde913d5c94668f4bf799ca99237bc776163ba348ba6ed691a41206772895227976b23d4d4ac3c80c4c51d63599565
-
SSDEEP
1536:4ACHF3uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qt89/V1se:rCHFP3ZAtWDDILJLovbicqOq3o+n89/T
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe -
Executes dropped EXE 1 IoCs
pid Process 4888 tmp6D21.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp6D21.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp6D21.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4832 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe Token: SeDebugPrivilege 4888 tmp6D21.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4832 wrote to memory of 1492 4832 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe 82 PID 4832 wrote to memory of 1492 4832 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe 82 PID 4832 wrote to memory of 1492 4832 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe 82 PID 1492 wrote to memory of 2348 1492 vbc.exe 84 PID 1492 wrote to memory of 2348 1492 vbc.exe 84 PID 1492 wrote to memory of 2348 1492 vbc.exe 84 PID 4832 wrote to memory of 4888 4832 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe 85 PID 4832 wrote to memory of 4888 4832 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe 85 PID 4832 wrote to memory of 4888 4832 226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe"C:\Users\Admin\AppData\Local\Temp\226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t3umx67j.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6DEC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9972D4D88B42F5AEF25B122C8B7052.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp6D21.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6D21.tmp.exe" C:\Users\Admin\AppData\Local\Temp\226e884859c3084e1e624ce7c0d0631101291c78a37712aa2901aed2244ee48dN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52cde3eeb6aae5dfdb6be25e5803b70bc
SHA1aa22c94d0498fdf503b2fd468848ef0b913704a5
SHA2569974479308ab53096889a77a20b2448cb607f227f13af19b287b2ab193031897
SHA512c4844104daee2c3bf39c7e72b95ed27bb0dfe8eac9d74472c01749dcc48d23c00b23112d52fee0a2cdbcc95ca394829207c8c5efcfd361e47eb82f31c70e33b9
-
Filesize
15KB
MD50a9e1f59a8811423188eb85ab12a39a4
SHA1f85ba51d7b396b71655e5956733baccc9c231c12
SHA2566725ab1922fb7b6fbcd0e6d96f1a58b7e1179d04da2fea1cd339429b8f13a1f5
SHA5122e53cd660e94713e0da1931f00cae0056df6af26e61eb81e941a9d1ee4f4b0e12d1b9e0a6491fbc55d0cf43bde08576b4adae1e162f2c7a1bf1cc5c1f9d1c037
-
Filesize
266B
MD54ed68c62310fc52e340cdbb41aebce71
SHA1933bdd449a88a25f0cd521fe8c7ac6814f621ffb
SHA2560f9f324d2ca66732aa7bff6b5a1624e8e51b1184a67c80a720a01f72bf7287df
SHA512857918fd885191e6ae615a3e03248e4806bd8d29425a1372fa5ee4f6982755f2f1a6debec6a6073f2c6c96e9fdd2ffd14ba42fe695a48db36456db859680f74d
-
Filesize
78KB
MD593ec218ac2096aa1d3a6f53f92fc2904
SHA17f35dba335bfb6ae0a35f21d757a0a8331bf7df7
SHA256d6529c128666ddc480a606c7959be2f1dfe223827133084043ad4cdb0d886b55
SHA512c463d6e2dc422aebb6919f651180d5cf1052da6bc1d6c78a4aded03455a0c97cdbca071a8152b5ff0f60f2ad84ffb54883d133f39e209777bd43b62b66a10c49
-
Filesize
660B
MD5a2e6f0fc88557cb216b1f5140d4f87b5
SHA1ccda09f294a0c22bcbca9da542e68d08ff7a5402
SHA2564a520f0553b7dfceb9a858609ea66211d9768d5158048db25ea16a72605926e7
SHA512a70aec295f877325cf486fb3ab1b842e79236e89533c39528119da31b347b26097f9bed88e4bc3712a1691f6abe523eb6930be90cd6858f442541eafcf66d6fc
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c