Analysis

  • max time kernel
    100s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 23:12

General

  • Target

    544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe

  • Size

    78KB

  • MD5

    ac7c9242beb4b5ad46d33f463daf6bd0

  • SHA1

    a2265ce21eb23f1dddae7641e778b279ca3a7e37

  • SHA256

    544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171

  • SHA512

    9ebb3e37b9087a73352f3b648a52b43dcdebe082cd429a5c1de5168c4d9f203356a1825dad0548de54d1ec63e2e2af9485b7d83c1e4b21cc07dc1776d6ea39ff

  • SSDEEP

    1536:svy5lAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtS639/S1PK:4y5lAtWDDILJLovbicqOq3o+nP9/p

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe
    "C:\Users\Admin\AppData\Local\Temp\544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\aigqer5p.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7984.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7983.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2912
    • C:\Users\Admin\AppData\Local\Temp\tmp76D5.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp76D5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES7984.tmp

    Filesize

    1KB

    MD5

    eee1f7ec5e168cff4c27b83b3694a2b6

    SHA1

    feb36dbb21b5bedd42829876860ca25c5f58e600

    SHA256

    f1fb18aa8c8f124fb5fe582be0484ba1af478f55560488787cb3d9f97b7b641e

    SHA512

    acede061a183a5c2359fd28ed7a37908f80ab048a9084835db342f7c8fbeb512487b5320da380f87e91790c0cfd92a45e75ea8aeee275a367c3b86e8c8e5618f

  • C:\Users\Admin\AppData\Local\Temp\aigqer5p.0.vb

    Filesize

    14KB

    MD5

    61552eab7e22fb57657bdd8b9ea8d7dc

    SHA1

    df88d9800bd710401374ee5bce417cde0086b55d

    SHA256

    b38a452ebe5610927d4413cefcaf0444cbc06c92832e83666e141c9f63efc754

    SHA512

    0642616259ff979bc185250bc51b7fbec402b88a0ec156c8deb8fa48217c9f1c4fd7271ac5c4c78cbb6aa974f8d0151ed0e9c0ebc41de3b864fd8f8ffe387435

  • C:\Users\Admin\AppData\Local\Temp\aigqer5p.cmdline

    Filesize

    266B

    MD5

    24169f7ac280baa6cefb4f61c70e74f8

    SHA1

    7620a4d2af51a9df0043222779c87a046bc33da3

    SHA256

    9ca9e575ebd72aa247860095ff91a40adfb0c568259d62c978d13c62a97a5b41

    SHA512

    52800761e7bb687c6440faff3d623a476a94d6c2c03a0885f6b160d31258c874f6e1f5836b5b585d98401eb29767ff9c46a2825118725b724824edd7c438fb14

  • C:\Users\Admin\AppData\Local\Temp\tmp76D5.tmp.exe

    Filesize

    78KB

    MD5

    b85d533a056a82c0dbb997b3d1960091

    SHA1

    5f86182b15a9bddeed4f1c55bfd23c5dcb58ca21

    SHA256

    e29b193af6567613f3b7bd486242ce04f098e666cffa847d26c231c29e6778b8

    SHA512

    2b415a9dec34ccd1d78b3d95c5b8ed5555cb9ed7296c6fbff1ee0050486ad29e2593ff8732104f42a958dea696d1e7efb23211007ccb4f4ef01eb81b9e16be36

  • C:\Users\Admin\AppData\Local\Temp\vbc7983.tmp

    Filesize

    660B

    MD5

    31a197007a0fd8f45882abef1dbe8306

    SHA1

    5fc92429a8b1848279eca54d3d805b7130ec840f

    SHA256

    c700280e6f0c03fb0253093ea87e310bb407688e515f399c802ee3b27aea1a3d

    SHA512

    a29d6c15d4cc1ec67c2a0f6b2f7bcb9618d754c1e628c9cbe0050c92a80e92e70ac1bdd78194cbac4032010a89287c98c896dbbac8fa9a26d95e4de983c9a72e

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/1876-0-0x0000000074C61000-0x0000000074C62000-memory.dmp

    Filesize

    4KB

  • memory/1876-1-0x0000000074C60000-0x000000007520B000-memory.dmp

    Filesize

    5.7MB

  • memory/1876-2-0x0000000074C60000-0x000000007520B000-memory.dmp

    Filesize

    5.7MB

  • memory/1876-24-0x0000000074C60000-0x000000007520B000-memory.dmp

    Filesize

    5.7MB

  • memory/2472-8-0x0000000074C60000-0x000000007520B000-memory.dmp

    Filesize

    5.7MB

  • memory/2472-18-0x0000000074C60000-0x000000007520B000-memory.dmp

    Filesize

    5.7MB