Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 09:50

General

  • Target

    c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe

  • Size

    78KB

  • MD5

    1a478e238e1e42b5b5cda9a8f9ff0c90

  • SHA1

    3cbd77d399cfd906dade8254968b4459ae2da986

  • SHA256

    c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2

  • SHA512

    2f0cb3ec7e9500b4c5cb21567758e2f31b47fef44a7f0da76b835d45c796529afb4759efc51a33bbddfcb7bcd95ff5f5c1d91f92b66a70a1f63a8187a0b01b98

  • SSDEEP

    1536:V5jSAXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6V9/FE1dA:V5jS4SyRxvhTzXPvCbW2U+9/J

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe
    "C:\Users\Admin\AppData\Local\Temp\c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lkdupngs.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8973.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc22ED4E8FE7CD445CA8E38B363117891C.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:848
    • C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c49a0cf4ae467e5989ee6c5d7e4b0a2e61e42e29e7f1b399974218eb17a82be2N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8973.tmp

    Filesize

    1KB

    MD5

    944d0a93dbd2a1d53a8330aeaddc2ccc

    SHA1

    77409de8191dd92b15313bb9bfe3933c716cb6db

    SHA256

    9e05dc5936a4bf492659ae73701f625bfb0b7932e190a13a4fe4a76fb7523f81

    SHA512

    98b7b1e4f086a7803c1b45616ee903243b6d844b44f634f52e715f1ed0a84393e6ac8bee87c1c26d17884df105fad23b35de00a630d4835f3771583e6cfdcf8f

  • C:\Users\Admin\AppData\Local\Temp\lkdupngs.0.vb

    Filesize

    14KB

    MD5

    cf219ec5fd5f075e475adbdd31ed2a72

    SHA1

    872af0c1fa43e64fb7f02390031f46ea4436c694

    SHA256

    2b823f76dab6ddd41d56f743322a175afec478db6cd40f4306c252a09da42673

    SHA512

    619c26e406fd8e920b5ecd277f3349a28b99cf15b0455d2e53874d2f664d429f862bca297d6aafbe6c1e27b27f8ba58597f7ff75393ec6551a109070b9639c61

  • C:\Users\Admin\AppData\Local\Temp\lkdupngs.cmdline

    Filesize

    266B

    MD5

    dffe9a81bdb880eddbcb7b5e9fb1aaf2

    SHA1

    2d2e06139970eac201ee64b34428ee66b9d869d8

    SHA256

    148c3adead92b8f75791baaba336ca29354f207bc0905955db9167b8efffd6a5

    SHA512

    bb758c7a954f47acde99940672c483c0cac06e5aca694f2753f3984e557049a78dafd2c573d701a71288ac4c2ebfba250a9439dc32b49696ab4b2de5ff632ae9

  • C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe

    Filesize

    78KB

    MD5

    012c119b32950dece7cba401268ac27b

    SHA1

    27dcbf6f076ca68143ffc86fcdb1b6753ac0c3a1

    SHA256

    6b20c5aab64ff022e45e1ee2079fec9ae27dd4673ef784fae332940025978345

    SHA512

    777770f86d7328fc4b0ad7c8395596b5b7d572c9de3be0d9d34851a22906665e188d07e437a7a1418820e7db13c9d524861f324412650202702cb7dd12be722f

  • C:\Users\Admin\AppData\Local\Temp\vbc22ED4E8FE7CD445CA8E38B363117891C.TMP

    Filesize

    660B

    MD5

    d7abf01b039a3ae9062f6bf1466ee2d7

    SHA1

    b4d65cb4cca25e649de4b1d35a371ce58f034189

    SHA256

    e0e8c5f8d3aa1650ec1bcd0e3d90443761d9ac9f506c21a0450ffcb05d0ee0a6

    SHA512

    1dbd4c615719afb62ab1bdf88d834e8f0b9644b7a0c74cdd992c3931183986b38b994af26c9f694af4d8ccb44048d61173aa70ee8ead0ce44062392ca6f0a29a

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/748-1-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/748-2-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/748-0-0x0000000074622000-0x0000000074623000-memory.dmp

    Filesize

    4KB

  • memory/748-22-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3104-8-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3104-18-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-23-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-24-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-26-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-27-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-28-0x0000000074620000-0x0000000074BD1000-memory.dmp

    Filesize

    5.7MB