Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 18:29

General

  • Target

    fca0eba34eab4134aa1856cfe5df3b5099af5a580d45f695abc886e31d125b81.exe

  • Size

    78KB

  • MD5

    fa1f726c2bd7e3e3053ec9c9f2b2fcda

  • SHA1

    4f7eaa0f880d1cbe4c48a8dd8ff11f1f3ec97dd0

  • SHA256

    fca0eba34eab4134aa1856cfe5df3b5099af5a580d45f695abc886e31d125b81

  • SHA512

    140f7b066c9654e55ae7c842a3a6bba3e016848f19e0dc22162371c47afbd103edc7365201115dd40047167192c68a4c35ec52066f9c8d0718cd76c544e32d47

  • SSDEEP

    1536:oV5jS6XT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtC6zP9/p1qhC:oV5jSiSyRxvY3md+dWWZybP9/eC

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fca0eba34eab4134aa1856cfe5df3b5099af5a580d45f695abc886e31d125b81.exe
    "C:\Users\Admin\AppData\Local\Temp\fca0eba34eab4134aa1856cfe5df3b5099af5a580d45f695abc886e31d125b81.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\h8alrkuh.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7753.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9958E2C7FF540DD9D18967DF8B5B8E7.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4876
    • C:\Users\Admin\AppData\Local\Temp\tmp75EB.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp75EB.tmp.exe" C:\Users\Admin\AppData\Local\Temp\fca0eba34eab4134aa1856cfe5df3b5099af5a580d45f695abc886e31d125b81.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES7753.tmp

    Filesize

    1KB

    MD5

    1b390a1bdc5b0fc065ff23a1aea1013b

    SHA1

    1dc2e23e40a61907022a5875f62225a8de22dfa4

    SHA256

    e1017521ef84f8c70fd12cf2c3539a5ec2e01dc8b26b5777a3068fe49df59dc0

    SHA512

    d4474ebe744db64e82f147543eb92b31fafe8144c017181b72ed3cf35e1dd76fb23389076bcd629ba27b2756d7b56ec1ae50b6fdad5692d8a34975155e7594ef

  • C:\Users\Admin\AppData\Local\Temp\h8alrkuh.0.vb

    Filesize

    14KB

    MD5

    481f0f6c7d94880261985ccb3619e65c

    SHA1

    9bd07e937f366f0f8c28c378f70650f51a61f113

    SHA256

    d37b74353fa161031204dec36949d655416b8c8e2adc8a56ca1f0d6424629606

    SHA512

    8248fb4b3e386c4afe795bf6ba89b1e96cb8184bd667c472fbc911b54eb38f68da01f1a94726b84a138af8a5ae1a0d112fc292db2d2f5c2739c8c6ae5e698246

  • C:\Users\Admin\AppData\Local\Temp\h8alrkuh.cmdline

    Filesize

    266B

    MD5

    a94d20f22993e70ca84f527228c38eac

    SHA1

    7e0645f99810e57e2954679b0a58262a55bb68ca

    SHA256

    414234699af1551233809881a525f0ac26819c2b7ff8f779363c45edfcdd47b5

    SHA512

    ea13eb0bb5365c6f8cf90d7d586e40f4180dc01558fe8b0c7e8beb299ff476549adf47e630d1733209f943e5e768562482fdc7d995192e419ed7f73d229c1d03

  • C:\Users\Admin\AppData\Local\Temp\tmp75EB.tmp.exe

    Filesize

    78KB

    MD5

    ed763d589bb282db21c43bb805dcd3ac

    SHA1

    02d0a26f3f6700d8aba22f498d7762855bb459ee

    SHA256

    69b7c0e654d2b69f3eb7067e13ac48d28b64a28eddb9a8c4e3cf43d9b3268ebc

    SHA512

    16d2e58fc78c55dbbdbf7907a49016b02e6ec9643f01f253a5b273fb889928cc0a39d10cce1cc2f13c5d06ba7f229a7b1857929f916d1ac3ae756fc3ff050ea4

  • C:\Users\Admin\AppData\Local\Temp\vbc9958E2C7FF540DD9D18967DF8B5B8E7.TMP

    Filesize

    660B

    MD5

    a24474f143f66823703b6fec6ab74dc3

    SHA1

    435ab165769adc58fcf7bc53fa5962ec1d8a6af2

    SHA256

    15495faa239c6fd0ed7e1d26b04fb39bb6fb527499fb265654e59d3de07c8ae5

    SHA512

    3ac33e60bde573c28fd1873bf3c804ebbd895f96aa97d704ff184a0f8ba38cb81bc68fe6035cbef0e0f08888486b0cd0c19e78a9fa4e2900a9a1f2654d39144c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/2244-1-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/2244-2-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/2244-0-0x0000000075562000-0x0000000075563000-memory.dmp

    Filesize

    4KB

  • memory/2244-22-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-25-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-23-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-24-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-27-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-28-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-29-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/4668-9-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/4668-18-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB