Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 02:13

General

  • Target

    dab05827c1608d680f5a5990016c089d5f5bc9736a8f8cae2179f9b7ddecacbcN.exe

  • Size

    78KB

  • MD5

    3584d349a83e79620e77fbb65ac995e0

  • SHA1

    066e6a2d4e7cf22c557fa0a7544cd958e7da69a2

  • SHA256

    dab05827c1608d680f5a5990016c089d5f5bc9736a8f8cae2179f9b7ddecacbc

  • SHA512

    cb483d653e7d809e5123d4f4cdcdc66534d788ee390877bc6a7b3b7388d9b74be6e15b25997c93c3d602a8181bb39fd668e73ba0cf5103bce8bcaa7fa9c5479d

  • SSDEEP

    1536:We5hXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtN6g9/F1hn:We5hSyRxvY3md+dWWZyP9/J

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dab05827c1608d680f5a5990016c089d5f5bc9736a8f8cae2179f9b7ddecacbcN.exe
    "C:\Users\Admin\AppData\Local\Temp\dab05827c1608d680f5a5990016c089d5f5bc9736a8f8cae2179f9b7ddecacbcN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\crvytvzi.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2DA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD2D9.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:372
    • C:\Users\Admin\AppData\Local\Temp\tmpD105.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD105.tmp.exe" C:\Users\Admin\AppData\Local\Temp\dab05827c1608d680f5a5990016c089d5f5bc9736a8f8cae2179f9b7ddecacbcN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD2DA.tmp

    Filesize

    1KB

    MD5

    b738bf643384ad6f16443811a94185bf

    SHA1

    8c7471efb55087a6fb6ff6cae60c9d2984f6a21b

    SHA256

    8f56205c285e557dfb98d3cf69385c35310078a047c7be8145326093944af13f

    SHA512

    f7ce48ea39700125b1c69cabeccf5c49a19a3290e1d715785872f2b7f71e1b1ad94cd7c21885f066bc7c9724707e8e35f8a863e5aca8f75590f2e24ef4bc0f4b

  • C:\Users\Admin\AppData\Local\Temp\crvytvzi.0.vb

    Filesize

    14KB

    MD5

    94f39efe9c6a564f6d62b9638941416a

    SHA1

    220ef743aab0a6ca52fc7f7827c9c4d2c8cfee9e

    SHA256

    082a18f09b134a58b8e3144ea5e88b1b17bc948765f9cacd3dc177dbee0ccb80

    SHA512

    cff91ff5b32c091c68d58fe91de64237d8e15240446633f9953e7e76a328ca975ce7cfd1c6111526cf4edf3021c9870ae9a235291db1e76b295c00c0be2dd4a7

  • C:\Users\Admin\AppData\Local\Temp\crvytvzi.cmdline

    Filesize

    266B

    MD5

    2caf027163bf55e42d169c1457328d2b

    SHA1

    8dde8bd8808244497e3bc09401912f0982939ae3

    SHA256

    2295534e77cb34507ba45c487025e98b845e9e9a0a31d7863ca68cf3ada91068

    SHA512

    e7acdbb60ff758f0ee8e8b56954bff50b863ef2b4fbff36e24308203cd4a594e7e09fe3b7057f5e27f4e57711bc2231584955d51592a213f0275b6b76d2d8afd

  • C:\Users\Admin\AppData\Local\Temp\tmpD105.tmp.exe

    Filesize

    78KB

    MD5

    45a26ea4736269958e1301a0398e740e

    SHA1

    c7cecf5b62495c46dcf4b5c64777c33f2c648e2c

    SHA256

    ecc59765fe37a94589495aabf874d38ccc918d0ae8bb846e1ea7eeb4a2b478e1

    SHA512

    2697f8d5d65042ce955124f7dac229eab1db6aeb1c09b84fcaefa4eef68c84efb1b86525afd0e5822fe88c1ca81dda873ad6993af29de4923120148375fe19f1

  • C:\Users\Admin\AppData\Local\Temp\vbcD2D9.tmp

    Filesize

    660B

    MD5

    943682653e3a7c50b7932f3331f5b626

    SHA1

    ef66ee7bbc622861735bd2720db692a58ab514de

    SHA256

    7ec89da3b198d4a1ab03d40d7a1a0dfeafba96445ecfd1e44417b7cf082d53a2

    SHA512

    e2aba672f1317b0308891f080bc92a005a3ca81aac9b108c550aadb6be0ec4d6892665581caf8ca047223f3bf8c3cd8a526406f5ba2941655a65d043e4d73565

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/2132-0-0x00000000744A1000-0x00000000744A2000-memory.dmp

    Filesize

    4KB

  • memory/2132-1-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2132-2-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2132-24-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2244-8-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2244-18-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB