Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe
Resource
win10v2004-20241007-en
General
-
Target
1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe
-
Size
78KB
-
MD5
7b4b36ee8b8dc68f31653e1b914cd9c0
-
SHA1
2b20f69b37060b272e4374661deeba18b17bd7b0
-
SHA256
1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0
-
SHA512
31eb2bbcef6f4dc8e128ad4c57fd9f809b727c50bda05e9d8d010ce98a425e4e45327648a2b3681c695f4827b9dcaf7ede5a356dcd86cdbf0dc076e7c9fea299
-
SSDEEP
1536:/y5jIXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6m9/q1tV:/y5jQSyRxvhTzXPvCbW2UO9/0
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2776 tmp9849.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp9849.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9849.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe Token: SeDebugPrivilege 2776 tmp9849.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 812 wrote to memory of 2404 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 30 PID 812 wrote to memory of 2404 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 30 PID 812 wrote to memory of 2404 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 30 PID 812 wrote to memory of 2404 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 30 PID 2404 wrote to memory of 1108 2404 vbc.exe 32 PID 2404 wrote to memory of 1108 2404 vbc.exe 32 PID 2404 wrote to memory of 1108 2404 vbc.exe 32 PID 2404 wrote to memory of 1108 2404 vbc.exe 32 PID 812 wrote to memory of 2776 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 33 PID 812 wrote to memory of 2776 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 33 PID 812 wrote to memory of 2776 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 33 PID 812 wrote to memory of 2776 812 1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe"C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uzb_la9d.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99E0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc99CF.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe" C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bcc2a9fbb20b1b4fea137bd049a7f7ec
SHA1a8d43497678df956537a6c79e9561e31b0b032ac
SHA25637b8cfa4743d92e671734be9a73ab922ee949aec76f9003b44957604c3917671
SHA5127989af17d941a5c89055efa6d7a2e3a7033b1544857033e61a7df9997e86362fa153992e062f3e729c363a604f932f528a65495f6c8a298b806e97bac57b2852
-
Filesize
78KB
MD52da78154760e32936a2ac77431433b53
SHA1c260c188f4ce1f6e332ec21016442bdfae3f2e5a
SHA256fc936fbc20f73c63ed2c1f616e4534252a29c4cbdc7bc4ea580d319bf15350c3
SHA51298675383b763aadb5ed8df2f9e9a706640a706f373e36154224c64175e50e32c4a8a783eb41a4191729abf19760d162def2a32b01dd4d82bb180fdfea2031611
-
Filesize
14KB
MD5ea9d18f1b062c1ddf5b994d76e79dd75
SHA1cc28e0f78a6a3f5a56df322021ec8f7fec53db85
SHA2568d024f8196394782766a6e845c87eb7833cf381a883d7e9e84922b8de3654a53
SHA512cd96358d81187c5a60f1dc332d3ddb03c970afe856959edeed2bdd446535cad947ac613385836af1250ff778dc64120a6d3a2e6364d9a01971df429dbfccb9ad
-
Filesize
266B
MD5ad4ff3df5a03b050ecb7922c62dd7a2c
SHA17268aac24c965e8046be57c2b6cccea2c429b752
SHA256d2a2b16d55c2b3e4a010a3684a29c7c313dd182b66fb3e96192a367c636c2eb7
SHA5127848c6ad7feb4cfa69862766c718fa6a7376ec8889f47a210ffbcf37fee040693010c843f4b21c5e3fc91551448ffc12b70792b9ca7941da2ec47657ebe82d71
-
Filesize
660B
MD5cf127a31b7ef557726c002a6dd013e95
SHA1c7da389a88a98bf8f8119ea351c8df59a0845ccf
SHA256a3dce558d67e233c758edcaa5ba99d570980843915337d66512f66ecb4eb6052
SHA512be3d796b902e08da7a59381a0f6de9dfefc4548c3833919606ca9e6576ce58f3a1386d948e238554edb978f488f8d70c1c2418645283351c890e729862332474
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c