Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe
Resource
win10v2004-20241007-en
General
-
Target
67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe
-
Size
78KB
-
MD5
6765843c164456a996ff1c44c0780b40
-
SHA1
fb450fa240cf0bfcf9c9c616f8c0b5564c956d63
-
SHA256
67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0db
-
SHA512
76db7335634ee65f0b2c2aa16f7e6e9774084bb81fad09645876577af6a1a641297dcee0e915d18499fc1330179a86eb25f45aafb11c98a826856aa5c0435c71
-
SSDEEP
1536:ry5jqXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQt96/9/11vZ:ry5jSSyRxvhTzXPvCbW2Uk9/5
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2840 tmp3B1D.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp3B1D.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp3B1D.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe Token: SeDebugPrivilege 2840 tmp3B1D.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2928 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 30 PID 2768 wrote to memory of 2928 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 30 PID 2768 wrote to memory of 2928 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 30 PID 2768 wrote to memory of 2928 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 30 PID 2928 wrote to memory of 2140 2928 vbc.exe 32 PID 2928 wrote to memory of 2140 2928 vbc.exe 32 PID 2928 wrote to memory of 2140 2928 vbc.exe 32 PID 2928 wrote to memory of 2140 2928 vbc.exe 32 PID 2768 wrote to memory of 2840 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 33 PID 2768 wrote to memory of 2840 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 33 PID 2768 wrote to memory of 2840 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 33 PID 2768 wrote to memory of 2840 2768 67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe"C:\Users\Admin\AppData\Local\Temp\67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\w1ob6mwi.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3BE9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3BE8.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3B1D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3B1D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\67f67edfd7a80533b4fbfd6eaa4b352dcca472f78daad383232338639133a0dbN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58d80d35379d3cec8b7c8a944f90977e8
SHA1510881d5224e527b893a9cf9da734122a34cbbec
SHA256816bec75ddbc9aa6371ed61077a4b65d1686aeb1dbf21053d286e37f08fb2d8d
SHA512a63f71962e19b5bef38eac0dd7d5717f42f774607a3cde75427d331a2b089ae2d4ddda2b7c8767633ce8d0ce8585832f3a5aeb87a9e83f34f7d06e1e44014fd5
-
Filesize
78KB
MD5a68e2cd2112e6f90e28185c4291bc4c8
SHA16e6e25800839e48e013c3ae021d2087090d8af13
SHA256e1799ee31ae6de086a68605ce6e1455b3574726701993ea0a315caf0500799b2
SHA512e957aec421294147932a9c1fa1832746faedeef15dad0aee774057b897d847951949448288892c457944b4a9e031566b1fb92f46dd6e28fde797e179b4d3d35e
-
Filesize
660B
MD5084adcc1ad62912808ae4cc6a54be6ab
SHA16b0a1d1764ef8c0866a9aeb3e14f1b69630f1229
SHA256e71882aeb39405315ababb30dbc353a7005217e1f59e393018825cda967663da
SHA512a9801c960516922ae1cff9658796801e2ec2d1fffd5d53efbb49cdd4dec61358ed75c1392ce3136fcb5d6082d80e05de46ac69d808c376e306664df383b1868e
-
Filesize
14KB
MD500e4b3177563c422c2b2af52d14bca0d
SHA1f2da60d693a4502665dbf36d3b09987ecf377854
SHA256d193e213a5dcb93a9ca65319be6e7981ce79261b72754f2824a93514d7eb5915
SHA512730344fadf973ce51e5cfbc3003e28cf82abfa377535bab564be43f46c119c2d3e4ed08566358bf609768db6da39172588622ec70611032250ae7642a4b478ca
-
Filesize
266B
MD51493fc31736ac09979697fd646871a56
SHA173eb004ed1c59318d09f04fd16256b08163e6221
SHA25654a15b4f5e645b1d8755fe67b9bf2471aac3bffb02a6d61e7c06548b2ef185ec
SHA5125998195e11140a83b04912c81333668b6d4531a9d647b3dac1f6229a35c87754bcb99be7a0198bdf92c3524dc99e1ef70ceafa99a7ea4ba815f2f96e0559553b
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c