Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 08:42

General

  • Target

    d395b9fcd1d819bd0d58451c543f972c27a5e0f7258ca965944f06e5d979f943.exe

  • Size

    78KB

  • MD5

    c2c5d0ef549670f2df92a41b047e8bdf

  • SHA1

    10775205638556dc83fcc2e0f8b272099a67d13d

  • SHA256

    d395b9fcd1d819bd0d58451c543f972c27a5e0f7258ca965944f06e5d979f943

  • SHA512

    cef24ed209d0ea122130f9fdf526659485fadb0621ef077486356ddef8a0588b923def50cbe9f0f0fe1166a496a3e4953b886f962c98e1e807728257303163f5

  • SSDEEP

    1536:OPWtHFo6M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtS9/K1+mO:OPWtHFon3xSyRxvY3md+dWWZyS9/yO

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d395b9fcd1d819bd0d58451c543f972c27a5e0f7258ca965944f06e5d979f943.exe
    "C:\Users\Admin\AppData\Local\Temp\d395b9fcd1d819bd0d58451c543f972c27a5e0f7258ca965944f06e5d979f943.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wtke23np.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFC13.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc527C3664B3774292BE76EEDD9A459DB2.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4616
    • C:\Users\Admin\AppData\Local\Temp\tmpF973.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpF973.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d395b9fcd1d819bd0d58451c543f972c27a5e0f7258ca965944f06e5d979f943.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESFC13.tmp

    Filesize

    1KB

    MD5

    c2975280249167d5f26d9112b9a3951c

    SHA1

    8fb282834973229daa0a7fb727a54d0a3c8aa987

    SHA256

    8134132dc6b112a882efa2e7ec77b1440de6933c0aa76054f3fb9d7bffd163a8

    SHA512

    2a17ffa1499ae00fdb2bbb60c1d41969e8dc439371eb1e069c8f517f9f0e66e13a9d7535004d6bc6e6e216629de981758d86e94cdb9ab856c318847d4053710f

  • C:\Users\Admin\AppData\Local\Temp\tmpF973.tmp.exe

    Filesize

    78KB

    MD5

    373aa5329e97a3f9c3446130cdce7117

    SHA1

    1f67ede1a3f70d08355ff479357e48390d8e17ff

    SHA256

    158412a36a6ebaf2728da8830da602390c3ca438e363aad06579fc51b240ac39

    SHA512

    5daf7477f11d91166feeb466bccd4fe699ab97a9e73205a51f4c9ab4a2b6a65c08c920c9633c3c80d3fbb575780ee7e6ef6c9fbb25494037c78c142f99b4112f

  • C:\Users\Admin\AppData\Local\Temp\vbc527C3664B3774292BE76EEDD9A459DB2.TMP

    Filesize

    660B

    MD5

    b146c4d6240b8fbf4b191fcb5a977727

    SHA1

    2bc2380fd8040fcec2d83317f6583be31513382e

    SHA256

    6a26565d6b015a32b124c8269dd94abfcc8fd3b3c7c8c9696f68b8ea2bbffb62

    SHA512

    accc144f35ff3536493104158dd2c0c2a937be51c649627b8b94d4087bae85d522fa79c7558b8b114c9c469f557417ba2b473f4e017e10d5b4008b0bc32e24bf

  • C:\Users\Admin\AppData\Local\Temp\wtke23np.0.vb

    Filesize

    15KB

    MD5

    31c2649983ca9e7e7e330e53586844db

    SHA1

    9d0b377518d3f2df5f07ffef57f565ae5e90cefd

    SHA256

    dcff52f1a258d6a77f96eabd3d74a873b0aaf114e0dd65af20a31aa7724fc936

    SHA512

    47bcb2f9d76bb7404e6446872c653d7137a1d1c22dbc90fa0c687cfd5acddc1057b30365074c179e6d39efbb3e03f14616257551bc2a7fa2f9e208bec45f48f7

  • C:\Users\Admin\AppData\Local\Temp\wtke23np.cmdline

    Filesize

    266B

    MD5

    65e754246c6ce5675e5aed96097e2fea

    SHA1

    8a272e1dad83f29823f6f627fffd0c6cf8a3cdee

    SHA256

    44ece7979d1aa01abbdbe62c3cd94ed975dd739ae6b43e20f752fcae665221a3

    SHA512

    993b6d8e4eec9b53692100b82696b8fa114f14b34364cca61f0644e283f2eefcc7ff7e158faeedaad5c8980957f28410e13818d903fa6526d338a11bcedbaacb

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/960-8-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/960-18-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/2420-0-0x0000000075522000-0x0000000075523000-memory.dmp

    Filesize

    4KB

  • memory/2420-2-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/2420-1-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/2420-22-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-23-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-24-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-26-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-27-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-28-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-29-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB

  • memory/3160-30-0x0000000075520000-0x0000000075AD1000-memory.dmp

    Filesize

    5.7MB