Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe
Resource
win10v2004-20241007-en
General
-
Target
13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe
-
Size
78KB
-
MD5
14c6df8a7a558231d17248a9239076ba
-
SHA1
6f022de51894a18f10adfea72aa5019571e15e37
-
SHA256
13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974
-
SHA512
6c29e54cc51d8fd4b25644ec3889f9de4aa5695ce052c362ce86f1db381229f857506f1528e71b4ac0d8d7e5bde018b582debbe7d71ef657938321df1cff5b2a
-
SSDEEP
1536:5o4tHY6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtP9/31V:e4tHYI3ZAtWDDILJLovbicqOq3o+nP9f
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 tmp7724.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp7724.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7724.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1356 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe Token: SeDebugPrivilege 2564 tmp7724.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2908 1356 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe 83 PID 1356 wrote to memory of 2908 1356 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe 83 PID 1356 wrote to memory of 2908 1356 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe 83 PID 2908 wrote to memory of 4012 2908 vbc.exe 85 PID 2908 wrote to memory of 4012 2908 vbc.exe 85 PID 2908 wrote to memory of 4012 2908 vbc.exe 85 PID 1356 wrote to memory of 2564 1356 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe 86 PID 1356 wrote to memory of 2564 1356 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe 86 PID 1356 wrote to memory of 2564 1356 13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe"C:\Users\Admin\AppData\Local\Temp\13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p_xraz5x.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES782D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7A176C237546B1A288A87FA2DD299.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4012
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7724.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7724.tmp.exe" C:\Users\Admin\AppData\Local\Temp\13532b5fccc839db8c7849786afb9b3960d312eca79a19bca9429f979b32b974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57de1d317081a57066786e2550081bf16
SHA1a0fa3a344422d187af04d1df8cc06f1a83eec632
SHA2562a806b195fb9574f2d42ed51029378b3656d3d0a7a3e1a648f7b85d39c21530b
SHA512cb7f3ac57b4da0993328cf299d7b85ec5b72ba420d671edbc453e60a5f9be526065ae11f1e9b46c728a5754e90db0cceb284517123bb8ea8515bcbb1d2359d96
-
Filesize
15KB
MD59d0f167a5d2905c392a636b1a5392f44
SHA1c98a77399ed10791f3b57f85b92f1448554ab90a
SHA256e601fe9a899ce97e041cea25d53f0f31b986d63da92450dd4044526c82b2c583
SHA512739ceeb8d01cca6d972f0194a26c161db2ffa161730239a2ed49b70424db603b60f9dfa477a963aadc1cf0f7df5c2d63e2f1762f5cb34bdf5f3458be53b520e5
-
Filesize
266B
MD52ad76e5102a78e0001a864e6f3a78b1b
SHA1a2be12e03675883844a4ff1bb9549b3699f53eaf
SHA25603a228796365dd262360cbf686cf3e5359059639e8c3cfeb74230f0996e4e341
SHA512fb05bb3ecf67363e01cef5d2e9d166127dd05cb14db7dea811bd6eaed85449223eda04ce81adb2c39dd85be0044be0d1d1c3837e6cbe9238948a302c5d441b22
-
Filesize
78KB
MD518b6ebf88c890aab80a75194b78d05c8
SHA13642e95b8bb1c9229c4487093f35f429197bde4c
SHA256c2101d0f35bd117199e12eadc64ac6d44e74e32eb6fe9b6eac4ab09f68527074
SHA5120876eff527b389c715169c693c6d0d66e5afdfa02d9f02e45e3eaed3dff4eff998a06e3e5b83d213ec9f3c7a7271c3e84e76cd13e71f9ab3b89f4557dba46a23
-
Filesize
660B
MD58bdece30657826a32fbf4ffc33b37222
SHA1da2f606c7653a211f0f78634143d34d585fb774b
SHA25687b8758f50c0c7e16738d185d71f641526561e01f6ff1ef386d6606e963b1771
SHA5129bc8c9e29132a621ca919912300547b71303fa18cc87f2eb8ba5967f00bc91ed40a47a62449ac3861eb301393c1a627e33a765f8ca2fb7b5dd7d4746b2b24c70
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c