Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2024, 16:32

General

  • Target

    5a45aefbc248a0f2c6d2f20d9dfc7fd675840688813a3e593ce7883fe9f4631d.exe

  • Size

    78KB

  • MD5

    53149184b5d895d93c2ec1cbd51e8e11

  • SHA1

    5b95fbb21e11950adc4a190a9a52a0536cfccbf7

  • SHA256

    5a45aefbc248a0f2c6d2f20d9dfc7fd675840688813a3e593ce7883fe9f4631d

  • SHA512

    9e037c03edb3c9383cbb97eb31c6d3fc277fa1afdb923ba5d51cc1e3f5f040a425be71b5d8cf2ee1cdb294b4ec5a26e810820780df0fa9e9b3cdb64facc7be15

  • SSDEEP

    1536:/y5jIXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6m9/q1tVh:/y5jQSyRxvhTzXPvCbW2UO9/0h

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a45aefbc248a0f2c6d2f20d9dfc7fd675840688813a3e593ce7883fe9f4631d.exe
    "C:\Users\Admin\AppData\Local\Temp\5a45aefbc248a0f2c6d2f20d9dfc7fd675840688813a3e593ce7883fe9f4631d.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6gbaudws.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3472
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CBF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB481D8A522A34E829B14ADD1A63FEEF9.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5112
    • C:\Users\Admin\AppData\Local\Temp\tmp8A10.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp8A10.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5a45aefbc248a0f2c6d2f20d9dfc7fd675840688813a3e593ce7883fe9f4631d.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6gbaudws.0.vb

          Filesize

          14KB

          MD5

          78069054b8692c779989695ffde5abe4

          SHA1

          5a7dd2d2f3458c0e68cae2cfb06d7f00e20305b1

          SHA256

          9e4d40a9ada6eda6720201b7619d998f4805d2a23341900d213e5c37bce3ab98

          SHA512

          906a82655f35c35a8b9b70bda935256eca8ba07961601ab358c3cce74ead950fa6b2625dd18acace35660d4940519c7c1cfed06305b88b1c94f4569e77635313

        • C:\Users\Admin\AppData\Local\Temp\6gbaudws.cmdline

          Filesize

          266B

          MD5

          95567d426a6668bcaf211e3055157dd1

          SHA1

          7235c82c353652bfe750b8800b5d1740f94826d7

          SHA256

          860eddb1c0154071900aac188415fc522555eb43b5743ec57243be467577107f

          SHA512

          9898a3a1f210a16a620e319291eda3986def803f0912e0773255b197d94ba9224f31a4f14099d36f3b601eebb801e9b51658a6fc19630ce768a7daae35a6c431

        • C:\Users\Admin\AppData\Local\Temp\RES8CBF.tmp

          Filesize

          1KB

          MD5

          72ccc11f517001bfcc51cdf875d67b05

          SHA1

          174c735ba29ce88d731200b3b4281619ccb0c6b0

          SHA256

          b0651fe9396021c533584372d132b4233fa9324ac52a71a676b1314773455253

          SHA512

          26482a7d6a3077c93224ceb6cec70b1b5f177f8b7860ac1bdf6e4f16fe4d2aa845a3cbbce01d5ed98efd936315aaeb25193698de637c5c32fc6249ef6c1fec31

        • C:\Users\Admin\AppData\Local\Temp\tmp8A10.tmp.exe

          Filesize

          78KB

          MD5

          cfe00a1f010b439f6e5fa524f10df677

          SHA1

          3cf597c73e263db81e1a3697a104641af0eca6e6

          SHA256

          01d0c669465ba824b099104888092953b805a374645280bedd11d17e857cd155

          SHA512

          4ac9db34c5b073f1ef397ab30ac7ec971c801166347b9a42462c3592122f93c8ae21dd6006f83493d813b10c5056d42d8cf3ad2ce01b226fc73d23d7a2b9edad

        • C:\Users\Admin\AppData\Local\Temp\vbcB481D8A522A34E829B14ADD1A63FEEF9.TMP

          Filesize

          660B

          MD5

          2ba964ea21c0a206b42706851525fc14

          SHA1

          1adb694b8c0b2c9064e076b07bdd45b00519f091

          SHA256

          490e3c663c25efc0f52c5ad8fcee2a6c3aac884f77cdeb858d2f995888c6f62d

          SHA512

          8d4b7d8f9a89df65fdecde79ff35bfc1bc7ef12950a369d8c684372d1aa9cf6a1fe18d00f2579b5a7dc09965d569004cf5c54ddb3d37be14bbfca8cf5299bd32

        • C:\Users\Admin\AppData\Local\Temp\zCom.resources

          Filesize

          62KB

          MD5

          8fd8e054ba10661e530e54511658ac20

          SHA1

          72911622012ddf68f95c1e1424894ecb4442e6fd

          SHA256

          822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

          SHA512

          c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

        • memory/2336-1-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/2336-22-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/2336-0-0x00000000752A2000-0x00000000752A3000-memory.dmp

          Filesize

          4KB

        • memory/2336-2-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/3472-18-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/3472-9-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/4404-23-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/4404-24-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/4404-25-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/4404-27-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/4404-28-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB

        • memory/4404-29-0x00000000752A0000-0x0000000075851000-memory.dmp

          Filesize

          5.7MB