Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2024, 11:34

General

  • Target

    1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe

  • Size

    78KB

  • MD5

    7b4b36ee8b8dc68f31653e1b914cd9c0

  • SHA1

    2b20f69b37060b272e4374661deeba18b17bd7b0

  • SHA256

    1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0

  • SHA512

    31eb2bbcef6f4dc8e128ad4c57fd9f809b727c50bda05e9d8d010ce98a425e4e45327648a2b3681c695f4827b9dcaf7ede5a356dcd86cdbf0dc076e7c9fea299

  • SSDEEP

    1536:/y5jIXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6m9/q1tV:/y5jQSyRxvhTzXPvCbW2UO9/0

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uzb_la9d.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99E0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc99CF.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1108
    • C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe" C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2776

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES99E0.tmp

          Filesize

          1KB

          MD5

          bcc2a9fbb20b1b4fea137bd049a7f7ec

          SHA1

          a8d43497678df956537a6c79e9561e31b0b032ac

          SHA256

          37b8cfa4743d92e671734be9a73ab922ee949aec76f9003b44957604c3917671

          SHA512

          7989af17d941a5c89055efa6d7a2e3a7033b1544857033e61a7df9997e86362fa153992e062f3e729c363a604f932f528a65495f6c8a298b806e97bac57b2852

        • C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe

          Filesize

          78KB

          MD5

          2da78154760e32936a2ac77431433b53

          SHA1

          c260c188f4ce1f6e332ec21016442bdfae3f2e5a

          SHA256

          fc936fbc20f73c63ed2c1f616e4534252a29c4cbdc7bc4ea580d319bf15350c3

          SHA512

          98675383b763aadb5ed8df2f9e9a706640a706f373e36154224c64175e50e32c4a8a783eb41a4191729abf19760d162def2a32b01dd4d82bb180fdfea2031611

        • C:\Users\Admin\AppData\Local\Temp\uzb_la9d.0.vb

          Filesize

          14KB

          MD5

          ea9d18f1b062c1ddf5b994d76e79dd75

          SHA1

          cc28e0f78a6a3f5a56df322021ec8f7fec53db85

          SHA256

          8d024f8196394782766a6e845c87eb7833cf381a883d7e9e84922b8de3654a53

          SHA512

          cd96358d81187c5a60f1dc332d3ddb03c970afe856959edeed2bdd446535cad947ac613385836af1250ff778dc64120a6d3a2e6364d9a01971df429dbfccb9ad

        • C:\Users\Admin\AppData\Local\Temp\uzb_la9d.cmdline

          Filesize

          266B

          MD5

          ad4ff3df5a03b050ecb7922c62dd7a2c

          SHA1

          7268aac24c965e8046be57c2b6cccea2c429b752

          SHA256

          d2a2b16d55c2b3e4a010a3684a29c7c313dd182b66fb3e96192a367c636c2eb7

          SHA512

          7848c6ad7feb4cfa69862766c718fa6a7376ec8889f47a210ffbcf37fee040693010c843f4b21c5e3fc91551448ffc12b70792b9ca7941da2ec47657ebe82d71

        • C:\Users\Admin\AppData\Local\Temp\vbc99CF.tmp

          Filesize

          660B

          MD5

          cf127a31b7ef557726c002a6dd013e95

          SHA1

          c7da389a88a98bf8f8119ea351c8df59a0845ccf

          SHA256

          a3dce558d67e233c758edcaa5ba99d570980843915337d66512f66ecb4eb6052

          SHA512

          be3d796b902e08da7a59381a0f6de9dfefc4548c3833919606ca9e6576ce58f3a1386d948e238554edb978f488f8d70c1c2418645283351c890e729862332474

        • C:\Users\Admin\AppData\Local\Temp\zCom.resources

          Filesize

          62KB

          MD5

          8fd8e054ba10661e530e54511658ac20

          SHA1

          72911622012ddf68f95c1e1424894ecb4442e6fd

          SHA256

          822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

          SHA512

          c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

        • memory/812-0-0x00000000741C1000-0x00000000741C2000-memory.dmp

          Filesize

          4KB

        • memory/812-2-0x00000000741C0000-0x000000007476B000-memory.dmp

          Filesize

          5.7MB

        • memory/812-1-0x00000000741C0000-0x000000007476B000-memory.dmp

          Filesize

          5.7MB

        • memory/812-24-0x00000000741C0000-0x000000007476B000-memory.dmp

          Filesize

          5.7MB

        • memory/2404-8-0x00000000741C0000-0x000000007476B000-memory.dmp

          Filesize

          5.7MB

        • memory/2404-18-0x00000000741C0000-0x000000007476B000-memory.dmp

          Filesize

          5.7MB