Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe
Resource
win10v2004-20241007-en
General
-
Target
c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe
-
Size
78KB
-
MD5
1a478e238e1e42b5b5cda9a8f9ff0c90
-
SHA1
3cbd77d399cfd906dade8254968b4459ae2da986
-
SHA256
c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2
-
SHA512
2f0cb3ec7e9500b4c5cb21567758e2f31b47fef44a7f0da76b835d45c796529afb4759efc51a33bbddfcb7bcd95ff5f5c1d91f92b66a70a1f63a8187a0b01b98
-
SSDEEP
1536:V5jSAXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6V9/FE1dA:V5jS4SyRxvhTzXPvCbW2U+9/J
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe -
Executes dropped EXE 1 IoCs
pid Process 3692 tmp88F6.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp88F6.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp88F6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 748 c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe Token: SeDebugPrivilege 3692 tmp88F6.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 748 wrote to memory of 3104 748 c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe 84 PID 748 wrote to memory of 3104 748 c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe 84 PID 748 wrote to memory of 3104 748 c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe 84 PID 3104 wrote to memory of 848 3104 vbc.exe 86 PID 3104 wrote to memory of 848 3104 vbc.exe 86 PID 3104 wrote to memory of 848 3104 vbc.exe 86 PID 748 wrote to memory of 3692 748 c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe 87 PID 748 wrote to memory of 3692 748 c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe 87 PID 748 wrote to memory of 3692 748 c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe"C:\Users\Admin\AppData\Local\Temp\c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lkdupngs.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8973.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc22ED4E8FE7CD445CA8E38B363117891C.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5944d0a93dbd2a1d53a8330aeaddc2ccc
SHA177409de8191dd92b15313bb9bfe3933c716cb6db
SHA2569e05dc5936a4bf492659ae73701f625bfb0b7932e190a13a4fe4a76fb7523f81
SHA51298b7b1e4f086a7803c1b45616ee903243b6d844b44f634f52e715f1ed0a84393e6ac8bee87c1c26d17884df105fad23b35de00a630d4835f3771583e6cfdcf8f
-
Filesize
14KB
MD5cf219ec5fd5f075e475adbdd31ed2a72
SHA1872af0c1fa43e64fb7f02390031f46ea4436c694
SHA2562b823f76dab6ddd41d56f743322a175afec478db6cd40f4306c252a09da42673
SHA512619c26e406fd8e920b5ecd277f3349a28b99cf15b0455d2e53874d2f664d429f862bca297d6aafbe6c1e27b27f8ba58597f7ff75393ec6551a109070b9639c61
-
Filesize
266B
MD5dffe9a81bdb880eddbcb7b5e9fb1aaf2
SHA12d2e06139970eac201ee64b34428ee66b9d869d8
SHA256148c3adead92b8f75791baaba336ca29354f207bc0905955db9167b8efffd6a5
SHA512bb758c7a954f47acde99940672c483c0cac06e5aca694f2753f3984e557049a78dafd2c573d701a71288ac4c2ebfba250a9439dc32b49696ab4b2de5ff632ae9
-
Filesize
78KB
MD5012c119b32950dece7cba401268ac27b
SHA127dcbf6f076ca68143ffc86fcdb1b6753ac0c3a1
SHA2566b20c5aab64ff022e45e1ee2079fec9ae27dd4673ef784fae332940025978345
SHA512777770f86d7328fc4b0ad7c8395596b5b7d572c9de3be0d9d34851a22906665e188d07e437a7a1418820e7db13c9d524861f324412650202702cb7dd12be722f
-
Filesize
660B
MD5d7abf01b039a3ae9062f6bf1466ee2d7
SHA1b4d65cb4cca25e649de4b1d35a371ce58f034189
SHA256e0e8c5f8d3aa1650ec1bcd0e3d90443761d9ac9f506c21a0450ffcb05d0ee0a6
SHA5121dbd4c615719afb62ab1bdf88d834e8f0b9644b7a0c74cdd992c3931183986b38b994af26c9f694af4d8ccb44048d61173aa70ee8ead0ce44062392ca6f0a29a
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c