Analysis
-
max time kernel
100s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe
Resource
win10v2004-20241007-en
General
-
Target
544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe
-
Size
78KB
-
MD5
ac7c9242beb4b5ad46d33f463daf6bd0
-
SHA1
a2265ce21eb23f1dddae7641e778b279ca3a7e37
-
SHA256
544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171
-
SHA512
9ebb3e37b9087a73352f3b648a52b43dcdebe082cd429a5c1de5168c4d9f203356a1825dad0548de54d1ec63e2e2af9485b7d83c1e4b21cc07dc1776d6ea39ff
-
SSDEEP
1536:svy5lAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtS639/S1PK:4y5lAtWDDILJLovbicqOq3o+nP9/p
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 1076 tmp76D5.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp76D5.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp76D5.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe Token: SeDebugPrivilege 1076 tmp76D5.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2472 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 30 PID 1876 wrote to memory of 2472 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 30 PID 1876 wrote to memory of 2472 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 30 PID 1876 wrote to memory of 2472 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 30 PID 2472 wrote to memory of 2912 2472 vbc.exe 32 PID 2472 wrote to memory of 2912 2472 vbc.exe 32 PID 2472 wrote to memory of 2912 2472 vbc.exe 32 PID 2472 wrote to memory of 2912 2472 vbc.exe 32 PID 1876 wrote to memory of 1076 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 33 PID 1876 wrote to memory of 1076 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 33 PID 1876 wrote to memory of 1076 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 33 PID 1876 wrote to memory of 1076 1876 544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe"C:\Users\Admin\AppData\Local\Temp\544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\aigqer5p.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7984.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7983.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp76D5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp76D5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\544ae03c2f06632190a241de0563810b236ac92e73a745442e18d1515bb63171N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eee1f7ec5e168cff4c27b83b3694a2b6
SHA1feb36dbb21b5bedd42829876860ca25c5f58e600
SHA256f1fb18aa8c8f124fb5fe582be0484ba1af478f55560488787cb3d9f97b7b641e
SHA512acede061a183a5c2359fd28ed7a37908f80ab048a9084835db342f7c8fbeb512487b5320da380f87e91790c0cfd92a45e75ea8aeee275a367c3b86e8c8e5618f
-
Filesize
14KB
MD561552eab7e22fb57657bdd8b9ea8d7dc
SHA1df88d9800bd710401374ee5bce417cde0086b55d
SHA256b38a452ebe5610927d4413cefcaf0444cbc06c92832e83666e141c9f63efc754
SHA5120642616259ff979bc185250bc51b7fbec402b88a0ec156c8deb8fa48217c9f1c4fd7271ac5c4c78cbb6aa974f8d0151ed0e9c0ebc41de3b864fd8f8ffe387435
-
Filesize
266B
MD524169f7ac280baa6cefb4f61c70e74f8
SHA17620a4d2af51a9df0043222779c87a046bc33da3
SHA2569ca9e575ebd72aa247860095ff91a40adfb0c568259d62c978d13c62a97a5b41
SHA51252800761e7bb687c6440faff3d623a476a94d6c2c03a0885f6b160d31258c874f6e1f5836b5b585d98401eb29767ff9c46a2825118725b724824edd7c438fb14
-
Filesize
78KB
MD5b85d533a056a82c0dbb997b3d1960091
SHA15f86182b15a9bddeed4f1c55bfd23c5dcb58ca21
SHA256e29b193af6567613f3b7bd486242ce04f098e666cffa847d26c231c29e6778b8
SHA5122b415a9dec34ccd1d78b3d95c5b8ed5555cb9ed7296c6fbff1ee0050486ad29e2593ff8732104f42a958dea696d1e7efb23211007ccb4f4ef01eb81b9e16be36
-
Filesize
660B
MD531a197007a0fd8f45882abef1dbe8306
SHA15fc92429a8b1848279eca54d3d805b7130ec840f
SHA256c700280e6f0c03fb0253093ea87e310bb407688e515f399c802ee3b27aea1a3d
SHA512a29d6c15d4cc1ec67c2a0f6b2f7bcb9618d754c1e628c9cbe0050c92a80e92e70ac1bdd78194cbac4032010a89287c98c896dbbac8fa9a26d95e4de983c9a72e
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c