Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 09:25

General

  • Target

    0ca247bde07da3773d6ba4a62ba95dfc079923bf8079059fe64571ab25620838.exe

  • Size

    78KB

  • MD5

    8b1a90f924ea8843777efa6bb36d9a44

  • SHA1

    b72b10564f5a9c7d6c5b26137746e641e8dadf8d

  • SHA256

    0ca247bde07da3773d6ba4a62ba95dfc079923bf8079059fe64571ab25620838

  • SHA512

    73c4f3c4cf864ba761acae2bfd7a75e054e629b4b575f4919b96ba73c95cb3cd6276bb7ba2d1830a39f859664948d6a6ad9ec365962b334f3f0782f3c4010dd6

  • SSDEEP

    1536:V5jSAXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6V9/FE1dAU:V5jS4SyRxvhTzXPvCbW2U+9/JU

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ca247bde07da3773d6ba4a62ba95dfc079923bf8079059fe64571ab25620838.exe
    "C:\Users\Admin\AppData\Local\Temp\0ca247bde07da3773d6ba4a62ba95dfc079923bf8079059fe64571ab25620838.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rehsdpgl.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES29EC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD33BEF25E15348EDBFA0B5E6EA977D3.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4484
    • C:\Users\Admin\AppData\Local\Temp\tmp2875.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp2875.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0ca247bde07da3773d6ba4a62ba95dfc079923bf8079059fe64571ab25620838.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES29EC.tmp

    Filesize

    1KB

    MD5

    4641ea32d2902a892cd825abc7d404dc

    SHA1

    6b337743760a27878f36a64cdd776eeea6c83b72

    SHA256

    c63690779241498ab1833d25e964fbd801851e62de61c6b16aa0ed929d90a987

    SHA512

    1abf951444c1b548ed13adf745b1aa433624a9e3af53fe94c5bb8c9cf65d67b791a3e1460e4bdd55e71fef05b5b5dc40525cec14cdd4ce162e8670795b6507a8

  • C:\Users\Admin\AppData\Local\Temp\rehsdpgl.0.vb

    Filesize

    14KB

    MD5

    dc50d57e7b3e957a60de168c13fe689a

    SHA1

    8dc1931af9950b4501eb3cc1acb39df46f82e6de

    SHA256

    571435e76307f99b0f592bd13a0d06021b77494c56025ab7dfcc853e9276c570

    SHA512

    37b4e48a92706139360794e92de257ac7ca312b449702fb7814f84ad2c88cde9ae490c9be049019cab55b55a140da068cc581597bbf658a2b16653e6ca170416

  • C:\Users\Admin\AppData\Local\Temp\rehsdpgl.cmdline

    Filesize

    266B

    MD5

    32f97aea0bb69033421bc5666a4c02da

    SHA1

    11a1b196f94070188154e90c27977c5204491880

    SHA256

    fb79e5b41e30dcc68ed8b3c977af0174616f0beaf11ff72adccdc68c80f4cf7e

    SHA512

    b68c8b602a4a5fa550e047182f54f93788785a349b0ad893e3147882059478def629920d96ec7350b3cf42057c5ac0965cb5ffdd2fb9845a4129623ad1fbfff7

  • C:\Users\Admin\AppData\Local\Temp\tmp2875.tmp.exe

    Filesize

    78KB

    MD5

    344252556ae20c6f60ffe2d4bb3523a9

    SHA1

    7e2ab099eff346e0c03caf8122ad4fb76856564a

    SHA256

    78710ea93613de3eeb03f8ff2041220f5455c4eebaca5076028067cefaefbec7

    SHA512

    a987e10ce798227bfa2ace4d173a1410d7ed8e30786e1a691c4b8cc634566572161967b7926250935fefe6f24df3cb0a25495196db8696de3661ddd491f340a5

  • C:\Users\Admin\AppData\Local\Temp\vbcD33BEF25E15348EDBFA0B5E6EA977D3.TMP

    Filesize

    660B

    MD5

    80a8ee450ed56ff1981ddd3d2bb19612

    SHA1

    c756113b7f1a93e035e99096a3e3d3cc9016ae65

    SHA256

    b00332a136a068a49baa574bafe7bf9ad7a7555cbf0ccd5d49d21a2aef292466

    SHA512

    79bf8054e8577128d5c83c3ac9771c135d9ccbe57d53375579c79c4ed0a7509c1eb13e436531f7f715cbf26ea467fe516c3a9b6f215a40d345d4b681f4885696

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2644-9-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/2644-18-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4564-23-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4564-24-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4564-25-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4564-27-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4564-28-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4564-29-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4916-0-0x0000000074BB2000-0x0000000074BB3000-memory.dmp

    Filesize

    4KB

  • memory/4916-22-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4916-2-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4916-1-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB