Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 23:24

General

  • Target

    67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe

  • Size

    78KB

  • MD5

    6765843c164456a996ff1c44c0780b40

  • SHA1

    fb450fa240cf0bfcf9c9c616f8c0b5564c956d63

  • SHA256

    67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0db

  • SHA512

    76db7335634ee65f0b2c2aa16f7e6e9774084bb81fad09645876577af6a1a641297dcee0e915d18499fc1330179a86eb25f45aafb11c98a826856aa5c0435c71

  • SSDEEP

    1536:ry5jqXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQt96/9/11vZ:ry5jSSyRxvhTzXPvCbW2Uk9/5

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe
    "C:\Users\Admin\AppData\Local\Temp\67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\w1ob6mwi.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3BE9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3BE8.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2140
    • C:\Users\Admin\AppData\Local\Temp\tmp3B1D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3B1D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES3BE9.tmp

    Filesize

    1KB

    MD5

    8d80d35379d3cec8b7c8a944f90977e8

    SHA1

    510881d5224e527b893a9cf9da734122a34cbbec

    SHA256

    816bec75ddbc9aa6371ed61077a4b65d1686aeb1dbf21053d286e37f08fb2d8d

    SHA512

    a63f71962e19b5bef38eac0dd7d5717f42f774607a3cde75427d331a2b089ae2d4ddda2b7c8767633ce8d0ce8585832f3a5aeb87a9e83f34f7d06e1e44014fd5

  • C:\Users\Admin\AppData\Local\Temp\tmp3B1D.tmp.exe

    Filesize

    78KB

    MD5

    a68e2cd2112e6f90e28185c4291bc4c8

    SHA1

    6e6e25800839e48e013c3ae021d2087090d8af13

    SHA256

    e1799ee31ae6de086a68605ce6e1455b3574726701993ea0a315caf0500799b2

    SHA512

    e957aec421294147932a9c1fa1832746faedeef15dad0aee774057b897d847951949448288892c457944b4a9e031566b1fb92f46dd6e28fde797e179b4d3d35e

  • C:\Users\Admin\AppData\Local\Temp\vbc3BE8.tmp

    Filesize

    660B

    MD5

    084adcc1ad62912808ae4cc6a54be6ab

    SHA1

    6b0a1d1764ef8c0866a9aeb3e14f1b69630f1229

    SHA256

    e71882aeb39405315ababb30dbc353a7005217e1f59e393018825cda967663da

    SHA512

    a9801c960516922ae1cff9658796801e2ec2d1fffd5d53efbb49cdd4dec61358ed75c1392ce3136fcb5d6082d80e05de46ac69d808c376e306664df383b1868e

  • C:\Users\Admin\AppData\Local\Temp\w1ob6mwi.0.vb

    Filesize

    14KB

    MD5

    00e4b3177563c422c2b2af52d14bca0d

    SHA1

    f2da60d693a4502665dbf36d3b09987ecf377854

    SHA256

    d193e213a5dcb93a9ca65319be6e7981ce79261b72754f2824a93514d7eb5915

    SHA512

    730344fadf973ce51e5cfbc3003e28cf82abfa377535bab564be43f46c119c2d3e4ed08566358bf609768db6da39172588622ec70611032250ae7642a4b478ca

  • C:\Users\Admin\AppData\Local\Temp\w1ob6mwi.cmdline

    Filesize

    266B

    MD5

    1493fc31736ac09979697fd646871a56

    SHA1

    73eb004ed1c59318d09f04fd16256b08163e6221

    SHA256

    54a15b4f5e645b1d8755fe67b9bf2471aac3bffb02a6d61e7c06548b2ef185ec

    SHA512

    5998195e11140a83b04912c81333668b6d4531a9d647b3dac1f6229a35c87754bcb99be7a0198bdf92c3524dc99e1ef70ceafa99a7ea4ba815f2f96e0559553b

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2768-0-0x0000000074C81000-0x0000000074C82000-memory.dmp

    Filesize

    4KB

  • memory/2768-1-0x0000000074C80000-0x000000007522B000-memory.dmp

    Filesize

    5.7MB

  • memory/2768-2-0x0000000074C80000-0x000000007522B000-memory.dmp

    Filesize

    5.7MB

  • memory/2768-24-0x0000000074C80000-0x000000007522B000-memory.dmp

    Filesize

    5.7MB

  • memory/2928-8-0x0000000074C80000-0x000000007522B000-memory.dmp

    Filesize

    5.7MB

  • memory/2928-18-0x0000000074C80000-0x000000007522B000-memory.dmp

    Filesize

    5.7MB