Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 01:30

General

  • Target

    127927fd121b31cfbb7b2e32f7632890ac31cbb36aa76209680387505835c7b6N.exe

  • Size

    78KB

  • MD5

    c3425d0a26733fcb3b95d6e9c715de00

  • SHA1

    a1cbdb8ffcae3e762086d0791ef938e3527af3ad

  • SHA256

    127927fd121b31cfbb7b2e32f7632890ac31cbb36aa76209680387505835c7b6

  • SHA512

    fcd60d671ee0dd7ccb5c7f44c6c20fc1d375007b4bf1a880d3cf7583cbae0846f3853a6828bb61d4efcd6c3be8e153b106330e7a722819b9e9a387d305a7f70b

  • SSDEEP

    1536:oV5jS6XT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtC6zP9/p1qh:oV5jSiSyRxvY3md+dWWZybP9/e

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\127927fd121b31cfbb7b2e32f7632890ac31cbb36aa76209680387505835c7b6N.exe
    "C:\Users\Admin\AppData\Local\Temp\127927fd121b31cfbb7b2e32f7632890ac31cbb36aa76209680387505835c7b6N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3oe3nl53.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B07.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7012D03A35824FBDA570C48391A689F1.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2864
    • C:\Users\Admin\AppData\Local\Temp\tmp99CF.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp99CF.tmp.exe" C:\Users\Admin\AppData\Local\Temp\127927fd121b31cfbb7b2e32f7632890ac31cbb36aa76209680387505835c7b6N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3oe3nl53.0.vb

    Filesize

    14KB

    MD5

    2bd99c65b1f6e9348cb16acf2cd83bc7

    SHA1

    c3a6256f727f5237736b02003c115fda5cabf266

    SHA256

    347cbe124a519a31c9563d274227ea0150b3e76c958895da265af3b6cb31e24d

    SHA512

    8a415e832d6feece2e6aca7d1bc71c2a94ce9a22ee8639deb8e66c5c3133cbc6447c3cffaf8c7e81b8a6f70eebd3b1c5d8b6b1a0560139d7df975c2b59f4b0f8

  • C:\Users\Admin\AppData\Local\Temp\3oe3nl53.cmdline

    Filesize

    266B

    MD5

    e711704c92ffae0f433787ecd2d544fc

    SHA1

    44efe11c1c2df06a4b08c5467315282ad32ce314

    SHA256

    abfb21094e638b02b0a4fb5e518b007c93569b6a312deb65b3f846384e9d4bf2

    SHA512

    82ef3a2525ae1c6e9267053653accbe68b358060663965b605289b05c04797d27d69f1719685ec953978efbabf28f9cc612cc2b906db78a75eb06f899f0e4b5d

  • C:\Users\Admin\AppData\Local\Temp\RES9B07.tmp

    Filesize

    1KB

    MD5

    80e5046959677dd898ebbe83bf931377

    SHA1

    179ed439bcfc479be194ddda2cb5ffd7b9659383

    SHA256

    8a50abe48282971bfe5e8945011513d36717f6dc256eeb0db3d9a9583bb4ba67

    SHA512

    2174594f043cfc3df49db3d50aa563d47f578da52c2f4b6e36757e1bd039a1b33ada220df43fa28c8f87049cf3ff0226d85ce46f20552b03512875743384823e

  • C:\Users\Admin\AppData\Local\Temp\tmp99CF.tmp.exe

    Filesize

    78KB

    MD5

    983062163b7815244267571c02130320

    SHA1

    0325c7601fadff8f8432f51973786ff057a94001

    SHA256

    27124c14c52b38e00fc0db869bbdc1f7e70da52563e0a000eb79c835160f4946

    SHA512

    f9cc6953bcd064de367f63c89a1041d975406118afb92274d835c13dce229553d67196439a3bf1418a018e1d73daa5bd13d5c8535f79b82e3159edf79f7a87df

  • C:\Users\Admin\AppData\Local\Temp\vbc7012D03A35824FBDA570C48391A689F1.TMP

    Filesize

    660B

    MD5

    d62a5fd65971ec86ed6c6e89a634ad14

    SHA1

    d6b3d6ac7cad1653e6bdd121e3267cdf725a4b0c

    SHA256

    f9eb9d5bfef041128c033eabda13357b3a722d4cc132f116a6f30b7bb718ad08

    SHA512

    37aa0098358774877bd278485baaf2a7a56ae5b4a3d715ae06067ef04df4466091a581811386687c2b45049eb02f1dc2814287097ae094869fad10ecf6682e66

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/3016-28-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-25-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-31-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-30-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-29-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-27-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-23-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-24-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4324-0-0x0000000075432000-0x0000000075433000-memory.dmp

    Filesize

    4KB

  • memory/4324-22-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4324-2-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4324-1-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4484-8-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4484-18-0x0000000075430000-0x00000000759E1000-memory.dmp

    Filesize

    5.7MB