Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 11:34

General

  • Target

    1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe

  • Size

    78KB

  • MD5

    7b4b36ee8b8dc68f31653e1b914cd9c0

  • SHA1

    2b20f69b37060b272e4374661deeba18b17bd7b0

  • SHA256

    1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0

  • SHA512

    31eb2bbcef6f4dc8e128ad4c57fd9f809b727c50bda05e9d8d010ce98a425e4e45327648a2b3681c695f4827b9dcaf7ede5a356dcd86cdbf0dc076e7c9fea299

  • SSDEEP

    1536:/y5jIXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6m9/q1tV:/y5jQSyRxvhTzXPvCbW2UO9/0

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uzb_la9d.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99E0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc99CF.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1108
    • C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe" C:\Users\Admin\AppData\Local\Temp\1275704c6fcb4f3c5a7debd7059fb0744b9ab5d95f0a408e7f47b844e3cdb5f0N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES99E0.tmp

    Filesize

    1KB

    MD5

    bcc2a9fbb20b1b4fea137bd049a7f7ec

    SHA1

    a8d43497678df956537a6c79e9561e31b0b032ac

    SHA256

    37b8cfa4743d92e671734be9a73ab922ee949aec76f9003b44957604c3917671

    SHA512

    7989af17d941a5c89055efa6d7a2e3a7033b1544857033e61a7df9997e86362fa153992e062f3e729c363a604f932f528a65495f6c8a298b806e97bac57b2852

  • C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp.exe

    Filesize

    78KB

    MD5

    2da78154760e32936a2ac77431433b53

    SHA1

    c260c188f4ce1f6e332ec21016442bdfae3f2e5a

    SHA256

    fc936fbc20f73c63ed2c1f616e4534252a29c4cbdc7bc4ea580d319bf15350c3

    SHA512

    98675383b763aadb5ed8df2f9e9a706640a706f373e36154224c64175e50e32c4a8a783eb41a4191729abf19760d162def2a32b01dd4d82bb180fdfea2031611

  • C:\Users\Admin\AppData\Local\Temp\uzb_la9d.0.vb

    Filesize

    14KB

    MD5

    ea9d18f1b062c1ddf5b994d76e79dd75

    SHA1

    cc28e0f78a6a3f5a56df322021ec8f7fec53db85

    SHA256

    8d024f8196394782766a6e845c87eb7833cf381a883d7e9e84922b8de3654a53

    SHA512

    cd96358d81187c5a60f1dc332d3ddb03c970afe856959edeed2bdd446535cad947ac613385836af1250ff778dc64120a6d3a2e6364d9a01971df429dbfccb9ad

  • C:\Users\Admin\AppData\Local\Temp\uzb_la9d.cmdline

    Filesize

    266B

    MD5

    ad4ff3df5a03b050ecb7922c62dd7a2c

    SHA1

    7268aac24c965e8046be57c2b6cccea2c429b752

    SHA256

    d2a2b16d55c2b3e4a010a3684a29c7c313dd182b66fb3e96192a367c636c2eb7

    SHA512

    7848c6ad7feb4cfa69862766c718fa6a7376ec8889f47a210ffbcf37fee040693010c843f4b21c5e3fc91551448ffc12b70792b9ca7941da2ec47657ebe82d71

  • C:\Users\Admin\AppData\Local\Temp\vbc99CF.tmp

    Filesize

    660B

    MD5

    cf127a31b7ef557726c002a6dd013e95

    SHA1

    c7da389a88a98bf8f8119ea351c8df59a0845ccf

    SHA256

    a3dce558d67e233c758edcaa5ba99d570980843915337d66512f66ecb4eb6052

    SHA512

    be3d796b902e08da7a59381a0f6de9dfefc4548c3833919606ca9e6576ce58f3a1386d948e238554edb978f488f8d70c1c2418645283351c890e729862332474

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/812-0-0x00000000741C1000-0x00000000741C2000-memory.dmp

    Filesize

    4KB

  • memory/812-2-0x00000000741C0000-0x000000007476B000-memory.dmp

    Filesize

    5.7MB

  • memory/812-1-0x00000000741C0000-0x000000007476B000-memory.dmp

    Filesize

    5.7MB

  • memory/812-24-0x00000000741C0000-0x000000007476B000-memory.dmp

    Filesize

    5.7MB

  • memory/2404-8-0x00000000741C0000-0x000000007476B000-memory.dmp

    Filesize

    5.7MB

  • memory/2404-18-0x00000000741C0000-0x000000007476B000-memory.dmp

    Filesize

    5.7MB