Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe
Resource
win10v2004-20241007-en
General
-
Target
2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe
-
Size
78KB
-
MD5
2bf1fc5fc39a05ac6f85f38847b3ca60
-
SHA1
a8325a6233e86978851be69b29b94c47bba3922f
-
SHA256
2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509
-
SHA512
dcfd2ac642d05e2684d9acece61b665296f19c50490c41cbbe47b302e0c0e6b5265343afd9c9ac78c44dc5479aecc06d4c83f14bcd9509d68abca9d69016c421
-
SSDEEP
1536:yVc5fAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtS649/j11NEK:oc5fAtWDDILJLovbicqOq3o+nw9/jqK
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe -
Executes dropped EXE 1 IoCs
pid Process 180 tmpAC1E.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpAC1E.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAC1E.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 920 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe Token: SeDebugPrivilege 180 tmpAC1E.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 920 wrote to memory of 2936 920 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe 83 PID 920 wrote to memory of 2936 920 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe 83 PID 920 wrote to memory of 2936 920 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe 83 PID 2936 wrote to memory of 3928 2936 vbc.exe 85 PID 2936 wrote to memory of 3928 2936 vbc.exe 85 PID 2936 wrote to memory of 3928 2936 vbc.exe 85 PID 920 wrote to memory of 180 920 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe 86 PID 920 wrote to memory of 180 920 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe 86 PID 920 wrote to memory of 180 920 2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe"C:\Users\Admin\AppData\Local\Temp\2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bay7hwxm.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAE51.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAFAFE2FD8FD84F7989CFFFAAD97198E.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3928
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpAC1E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAC1E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\2a60f5beb7e76d1142c00699aa864dfac91f1024c5d81145c506a57d261be509.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f680793c4e70f1ad9a974e3363f5f0e
SHA1b0d95a32587c034399a2e73accc8017a20e45108
SHA2562551318ce7e68e059139d8c1b254884bb35f66fdce776136917c4a785cadc118
SHA512a88eb6ed8179d21292bb216b3378953a5a217037add18eb2c2f85e1d2cd4c644a1abca73da7bad1739e22465d34a38b92bd147ab94bd247f90bc2fa88a90157b
-
Filesize
14KB
MD536ede8864e069a2ac602c0d129a07c20
SHA17dd2e21550743da673e17b2b400d19430fb72402
SHA256c0197632ebfc82ab20d45f25c194956762a30173059d88b24fdca4d23dcac8bb
SHA512747201e613fd09e9a4144bae2db3ae962a08519dc1fcd47dbe2bbf7192086247d2ac485261883818d63074290ca985264895c2e6cff106e5c9e42bc258e081cf
-
Filesize
266B
MD59fa02c0656151c9bde2dcf54f2215ec5
SHA1b89c20868c4fe1d728842e045593a1c143e8ba97
SHA25609c9620084b1abd0f80206e359c23c3893b3d65f8468a85d6a9a375419ec08a7
SHA5128a8c5eef35669cc2c592c14b0db4a30897b8924387bfb05926cd57484c35e615477074064e58ad015f3cef1c721b66db831578dbcc4e2b03a860e82f5ec84e11
-
Filesize
78KB
MD5edda71f82d9bf966fdeac48966ca1bd5
SHA11450b296bed502680b5a0a36dcbab29913e82cc3
SHA256f8fcc9d08fe9ae6de3d8e1b610ffbcfd318a6a22ede942217d0f072e35fe822d
SHA5123aebb63d230bf96bf9bf13880a45f943a6ab9f73e5d285fa8508b0d6ad6b2fed7874c381c5f2a9d1f992e328bc6b93a68b50321c8314d9da4da6487124f44073
-
Filesize
660B
MD52d138756aa37ee6b04dfe6187d1af208
SHA1ad39537c0fd8eacfe5153068d59e2ab302321e15
SHA25649d90128b752e84f859aa7199ffa635fbab56edf4b01bc3e86211b4653a43de3
SHA512c0f628ee28d36faab57d823f7e45cd55e2012c503537676029a46a5f6e59b177ec4ca87a157ddd66cacc04d6b86b28c38ce64bfedaa95124c51084097b53a354
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c