Analysis

  • max time kernel
    112s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 13:23

General

  • Target

    2e276a526de749d2ac256339726564eadd69985bc3c480a08b01b0d60b63d4fdN.exe

  • Size

    78KB

  • MD5

    363c5ce3196976ef1ffb56b5e159dc10

  • SHA1

    a5f903bef3d78c56f706ac8b430fe8ee2773a1aa

  • SHA256

    2e276a526de749d2ac256339726564eadd69985bc3c480a08b01b0d60b63d4fd

  • SHA512

    957d159242cad352f10ac131f7fbf5462f9e8118bd941f50250ab5e46cb78e71764daeecb2453aa6e8c2175189d82aa0223dbabc36064413f9752a1ccb7ada2b

  • SSDEEP

    1536:bPy589dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6u9/Z21KE:bPy58on7N041QqhgW9/Z8

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e276a526de749d2ac256339726564eadd69985bc3c480a08b01b0d60b63d4fdN.exe
    "C:\Users\Admin\AppData\Local\Temp\2e276a526de749d2ac256339726564eadd69985bc3c480a08b01b0d60b63d4fdN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\w3_qwekt.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8A2F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB2665BFEFD44AC293D9278356791A5.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1488
    • C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\2e276a526de749d2ac256339726564eadd69985bc3c480a08b01b0d60b63d4fdN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8A2F.tmp

    Filesize

    1KB

    MD5

    fcbdad34aba675977cff590ad7267d8e

    SHA1

    be3890c184cc5a239c13e2967a33080c7787f698

    SHA256

    34a50560f7767c27eb907d1341754012669fa79e71e9958bff55fb63c6e80c28

    SHA512

    d70440bf145c1f7fff0e602740c6b7f9a3b28d9017b309098acb793ba5f54702f8aa58ddc60c9d2e5abd2d53472c176bcbf27181d91de0dc3f2f4d3daba4bd0d

  • C:\Users\Admin\AppData\Local\Temp\tmp88F6.tmp.exe

    Filesize

    78KB

    MD5

    fe91125e7802cdc652eff9dbfd5f02bc

    SHA1

    ab6a8aaee1a97a8d8f11a9b6552b08ef62a1786f

    SHA256

    5cc2a2e9c3d112f87c06088d48ce5f5c344d6f7e019ee0977800fb58b46ff5e1

    SHA512

    4bbce8d1212f35cf7ead2be51f220e138bb47f7f28d785040700920f9b0ddaf240fbcc0004a8e4f0c3d146f2cbc3b7d8e6665ffb3be6e1558d4d5e41cb562fa2

  • C:\Users\Admin\AppData\Local\Temp\vbcFB2665BFEFD44AC293D9278356791A5.TMP

    Filesize

    660B

    MD5

    d7abf01b039a3ae9062f6bf1466ee2d7

    SHA1

    b4d65cb4cca25e649de4b1d35a371ce58f034189

    SHA256

    e0e8c5f8d3aa1650ec1bcd0e3d90443761d9ac9f506c21a0450ffcb05d0ee0a6

    SHA512

    1dbd4c615719afb62ab1bdf88d834e8f0b9644b7a0c74cdd992c3931183986b38b994af26c9f694af4d8ccb44048d61173aa70ee8ead0ce44062392ca6f0a29a

  • C:\Users\Admin\AppData\Local\Temp\w3_qwekt.0.vb

    Filesize

    14KB

    MD5

    286e69ed4b77e01276f0add514e64cff

    SHA1

    56dd690035a7871a1408a9d1ad229db53f1e4f39

    SHA256

    39e60b7d6c5401651297be57dd9be52705935aea93ed093cfa8249eca2f08e41

    SHA512

    f9c6843c93c44e615815f3dcd8373e8b34fbbdcaa3db95e333af7cde764413ae15423802b5aff8f7d8efddb0f04cafbf35e0287f30d235b7dee076a88bd440e6

  • C:\Users\Admin\AppData\Local\Temp\w3_qwekt.cmdline

    Filesize

    266B

    MD5

    0301ff37b6de060d42dd7ae043a7a164

    SHA1

    471a2ed191d7b9fa94710f8d3790f42d1e1afb01

    SHA256

    37ae7dc66509f59af90f1f43ea541a2e2ccca39e5b7519a455c059044c644033

    SHA512

    38406f5bfe62ed9c89edfca019397b8ecaa9090c41fe641e8f3629ada2e8da82e679e79a9d7dee7a76ed747e85cda79922f64b3b1cc4d1a5fd78630f1e02db0b

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2828-23-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-24-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-26-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-27-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-28-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3144-8-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3144-18-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3340-2-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3340-1-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3340-22-0x0000000074D10000-0x00000000752C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3340-0-0x0000000074D12000-0x0000000074D13000-memory.dmp

    Filesize

    4KB