Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe
Resource
win10v2004-20241007-en
General
-
Target
448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe
-
Size
78KB
-
MD5
e81f39af6852661c5d7af31cb16eefe6
-
SHA1
90150edd2d02c688e2de190e3187a3d2e45aae23
-
SHA256
448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96
-
SHA512
e37661771cecc969af48f10472911201a4d2c849a9e9bc1931d22a5b3dd765f10529485a08502fad931292c80d6a6ea771be4733bce9a20f690ba638f3bca4f7
-
SSDEEP
1536:whHFo6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtM9/M1I:cHFoI3ZAtWDDILJLovbicqOq3o+nM9/M
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe -
Deletes itself 1 IoCs
pid Process 368 tmpA0D4.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 368 tmpA0D4.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpA0D4.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA0D4.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4604 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe Token: SeDebugPrivilege 368 tmpA0D4.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3344 4604 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe 83 PID 4604 wrote to memory of 3344 4604 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe 83 PID 4604 wrote to memory of 3344 4604 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe 83 PID 3344 wrote to memory of 1352 3344 vbc.exe 85 PID 3344 wrote to memory of 1352 3344 vbc.exe 85 PID 3344 wrote to memory of 1352 3344 vbc.exe 85 PID 4604 wrote to memory of 368 4604 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe 86 PID 4604 wrote to memory of 368 4604 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe 86 PID 4604 wrote to memory of 368 4604 448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe"C:\Users\Admin\AppData\Local\Temp\448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\y9k9vkkr.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA26A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2C0B2728D58945D0B353757B3D58254B.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA0D4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA0D4.tmp.exe" C:\Users\Admin\AppData\Local\Temp\448e099e41b0730f0b736f603e4d8f2d802692da572ca58f09d98833fef1ab96.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9c6f978ef0af3809d14c5bb1657279e
SHA15354d9143f1a16b34fded3a0dd7f2990b540c32d
SHA256a7ca47b533a8acb8e298a7ebc2651c20415475abdab10d487d82860a4dd6b14d
SHA512917588f0d9369fed66444ceacf32c26aad7b522592062dccc152eee105d7e2411814d08ccfcd5d59f4aa04f6ef0c40935007e8ab94dbd15a9b72d4f2129c7eb7
-
Filesize
78KB
MD5152536ce08d54ef9070730e02bbf7da5
SHA1d40f650b112d4c60dc1935b099a017d722364c1d
SHA2569ea455efb69d0e0861620d2154ac6309622f12f49e82091febd99e709f01b753
SHA512d13aadc2ff3570a6e864787c9e3322c296634d2ae16783ca9b84d5c5f25640c3e52314fbe8dd21c2d9c1e26ac5dfd0853a53805ab3b871ff0181d40e08778c92
-
Filesize
660B
MD5cfd993230ed84d7e27f97fcb4f694948
SHA14c0e458dd731d803895dec9a997b4f8d38a5e776
SHA256e7582328614754d10aee20e0cf451076c41c20a04df1b10d084e6a55c5240f95
SHA512e88e668e4d786561953a8ccb504b36773b91f5ca715a2c885b51f046ffe0164080df561f60d3f411a99078c4cac36956602b288620596dc5b726c4699c881062
-
Filesize
15KB
MD57ec485edecbdd742e7255cc307a563f0
SHA1a4bbffdda9faa40feb608b79810891057e772512
SHA256d47a61b00fcb996c880a5890daacc20b5d1b87772b580e3d1c125a6eb9b46286
SHA512df4fd77d8ce6db813c4034b71c11272a039651f7a5cf667f211f04ca1c9fe2e76c507c403df8af327d74c0086c6be29224f4048711ceb15b1b1a08328e7dacd7
-
Filesize
266B
MD5acbe41063b4451792b4ef7e8fb263145
SHA12ffc92970bea882a3cbe1d2aea017c10fecdaabe
SHA2560d6d7d4043a87b3cf45a623f628b852ca707929360775e697aef388a175bdccb
SHA512d3de8f168e0ba53d54e8e506526b7b4270ef9e8ef47cd288e57dd60376f44844d4038c141b796bf3c23d5532364e59de3a590008158e624df40ed0c94c89b600
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c