Analysis

  • max time kernel
    102s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 07:38

General

  • Target

    96f00c2a0e521d6f9c3bb377b264735135130843dd4f31c017491f51808c6596N.exe

  • Size

    78KB

  • MD5

    5e89b0338575ddd2be5c11790cef6610

  • SHA1

    f0e5e9cbda347a1e7e30c4af945c3bc72c96d286

  • SHA256

    96f00c2a0e521d6f9c3bb377b264735135130843dd4f31c017491f51808c6596

  • SHA512

    e5754a544c49b7441975c98bb1119a31fb531638d3307a438e882486e47534ba6d0bdf19ffe7b1ebd8cf7bd0bfe9451dafd705d030bbf52f6ef4c9daf5a1ba20

  • SSDEEP

    1536:SvWV58/pJywt04wbje3IgTazcoOEEQLwdCRoaeuProYMHQti6d9/2K1Zg:sWV58BJywQjDgTLopLwdCFJzF9/2J

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96f00c2a0e521d6f9c3bb377b264735135130843dd4f31c017491f51808c6596N.exe
    "C:\Users\Admin\AppData\Local\Temp\96f00c2a0e521d6f9c3bb377b264735135130843dd4f31c017491f51808c6596N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yeu_bp60.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9C30.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3F6BFA8BF2854E8C81D1B3B04E137D5.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2996
    • C:\Users\Admin\AppData\Local\Temp\tmp9B36.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9B36.tmp.exe" C:\Users\Admin\AppData\Local\Temp\96f00c2a0e521d6f9c3bb377b264735135130843dd4f31c017491f51808c6596N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9C30.tmp

    Filesize

    1KB

    MD5

    b30e0ec2234373ddabd9d7509db0f221

    SHA1

    803b6f64ff8da67baace225d184dbe7d79a27af0

    SHA256

    696c3a96d09cb6ffe649413daf56220cf7f3c2cea592690d0d212ebf1f7031b3

    SHA512

    794bc64a089ce7eb9ade95aa78237dab76edefeb45635636ac5c7918d75993b22f5543245b74f28153e976022f51c99a0798d83f27500279eb51c96fa723f54b

  • C:\Users\Admin\AppData\Local\Temp\tmp9B36.tmp.exe

    Filesize

    78KB

    MD5

    7a858c7fbd191dc1b23a7e5384c5a27d

    SHA1

    9335618ae1ea2e69604c2ed87d8b2ccb4821b16f

    SHA256

    dcf7ca2d5b975302ca179884f0653a108fc8952f9c33620ef1382374c5ad6068

    SHA512

    78090fb4af621daa3c98e8daad3bf7aa6a2860a5de7e0e65704e8c49fbdf0538b0488e2cb601d8eec431ad7a978c07a4c135f65456d5e53c13d9a7a6fd0a9208

  • C:\Users\Admin\AppData\Local\Temp\vbc3F6BFA8BF2854E8C81D1B3B04E137D5.TMP

    Filesize

    660B

    MD5

    0d9ac80cf4df857aa92bab1bd0b3e222

    SHA1

    2e57c949ce07e322867554cf6a54a68e59a93f3e

    SHA256

    8e9533cec629f5d6f02735c19273fe00054d2dca610fc02531122a413e4ecced

    SHA512

    90b53fed1d399c7e546cc5eaf26b7749a147f6f6e1fdf7e31e707094c30c8a45db90a3e6ad2bf47ff4c18e43f29f4ee5bcb504da63b53da58581edfbe72a6a75

  • C:\Users\Admin\AppData\Local\Temp\yeu_bp60.0.vb

    Filesize

    14KB

    MD5

    842195ade94cce90e52afb46144e3cb7

    SHA1

    65254d02ecbcc3e588026de6d5e2c87f069126e9

    SHA256

    35de17fbbf25289bed07477c0fe8e4f06de03694f8616133f01b0a91a31a5efa

    SHA512

    964c00f707671e177f644b397efeec485205a4db406cbe31a49a0846e57e4f606bd5b37010c725eb832b4219f922603e346950422f0415b02c8381c6c5f1fe82

  • C:\Users\Admin\AppData\Local\Temp\yeu_bp60.cmdline

    Filesize

    266B

    MD5

    7676fd3875d75f24a8faba8dfdcebe90

    SHA1

    199c68309c31816939d685decc2d24c040931080

    SHA256

    96a6cb1b0346bb246846f326e04c80dd7e1bf3650c2acf0b8e657b4cb57dbb00

    SHA512

    a4331769763c9feabb5b5f28f3a945a20c227b51d15dfae9bd3c94e49f81e811e07bf275bc47223de9b52560464d18241a2148298176fac01a34768782aa1424

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    484967ab9def8ff17dd55476ca137721

    SHA1

    a84012f673fe1ac9041e7827cc3de4b20a1194e2

    SHA256

    9c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b

    SHA512

    1e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7

  • memory/2508-8-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-18-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/3744-23-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/3744-24-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/3744-25-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/3744-26-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4960-0-0x00000000747C2000-0x00000000747C3000-memory.dmp

    Filesize

    4KB

  • memory/4960-2-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4960-1-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB

  • memory/4960-22-0x00000000747C0000-0x0000000074D71000-memory.dmp

    Filesize

    5.7MB