Analysis

  • max time kernel
    101s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 01:34

General

  • Target

    24780a3789bdc0a7401467c175b95ef549f6b4de45dd6ad3d80626f62b91524b.exe

  • Size

    78KB

  • MD5

    8a912d38b039ec348364f11af3af84fa

  • SHA1

    cc7b234633b2b3e0473fdd3ab34cc942e601f7bd

  • SHA256

    24780a3789bdc0a7401467c175b95ef549f6b4de45dd6ad3d80626f62b91524b

  • SHA512

    e376b43328c8b45b5ad76e43d690d05bce7c69cf2af0a728544cf09093f3290c4fd3c86ae0e2293b63d5660458bd8ec3e28884030e56a48652f8f4125e576d38

  • SSDEEP

    1536:SCHHM3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtdx9/Q1dvN:SCHs3xSyRxvY3md+dWWZyj9/cN

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24780a3789bdc0a7401467c175b95ef549f6b4de45dd6ad3d80626f62b91524b.exe
    "C:\Users\Admin\AppData\Local\Temp\24780a3789bdc0a7401467c175b95ef549f6b4de45dd6ad3d80626f62b91524b.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zoxmmr11.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB378.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB377.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2068
    • C:\Users\Admin\AppData\Local\Temp\tmpB23F.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpB23F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\24780a3789bdc0a7401467c175b95ef549f6b4de45dd6ad3d80626f62b91524b.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESB378.tmp

    Filesize

    1KB

    MD5

    45528a5986c32c6062c1b2322d1507d3

    SHA1

    f8de5fd6a24fa7a79a2366ac0c81414d1b48b8ca

    SHA256

    a9a7690565b669376367785161d76881046b653a4dc6db97ad503a9350854900

    SHA512

    95c8247067c1c7466ae487faad23ab8078f12c54743096377b3162306e261576bacb3ca48a16a6a2d5ca072180b1ba12f540c3c44903bc7711a404725739a07b

  • C:\Users\Admin\AppData\Local\Temp\tmpB23F.tmp.exe

    Filesize

    78KB

    MD5

    8e06f45668461750e28f46e67e2b6090

    SHA1

    c15c399e269e825cc6f09ab6bbb625d8f8082133

    SHA256

    eb6ee8158501526346df4e9b665b8a9d2031eb5f7f47182d97954433b61fbb35

    SHA512

    30575bfeeae57efb0c4407db391e49762dca924e743512efa1ace684fefd5b6931e30ab91b13b8b1762b9b067dd1272e22c487bf4c94d3c7a65f9e192e419998

  • C:\Users\Admin\AppData\Local\Temp\vbcB377.tmp

    Filesize

    660B

    MD5

    2f8d8439cdf20f522e63fa08cdba1185

    SHA1

    cee00740a8e8cda1e283cdbbecf509c4b4c2abdc

    SHA256

    10c61c9f5f5aded403b4ac97d6a3cb3bd09ee3e5cbdf3148346e143d1de7c75d

    SHA512

    cd8cc891586b5c54c08c7d4296e67d2814f03a7a2713749f26390a7417475626e279573fa1827c742d5434d846af928c59a91a72c3caecbe4c0d5c3afe910e0a

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • C:\Users\Admin\AppData\Local\Temp\zoxmmr11.0.vb

    Filesize

    15KB

    MD5

    2c184abb408deeacfb2da663bd2d0002

    SHA1

    642bdd8a475e6803182c3d0c67370088fdc804bf

    SHA256

    41814328d4a6be003e7630f213b78b0170ae0a1cd64df909a1ddde406201d2bc

    SHA512

    31de88200355b81f01c26046de9a2a011934725090c365b9f03e893c78308ee4daa40f9327ab8550741c34290ee3b1649f7056d745f01962a695fa39fbef0529

  • C:\Users\Admin\AppData\Local\Temp\zoxmmr11.cmdline

    Filesize

    266B

    MD5

    354d8d16fcae8bdc97e346b667aa656f

    SHA1

    c3424bf2352517da7f75cd43bea6ee1d811304fb

    SHA256

    5ca01e65e7ada77bb1a465547680c9516b167cdaac0318fac592b7383120ab89

    SHA512

    873983aea50bb9ef01bb3cfa1fe2c69f8e02c4e7ae4006a2835ab33fcaa06f072b97c07dca8eb16554ec177c227ba9db74c91947bf3d5976318c2ddc0c28ade5

  • memory/2484-8-0x0000000074C70000-0x000000007521B000-memory.dmp

    Filesize

    5.7MB

  • memory/2484-18-0x0000000074C70000-0x000000007521B000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-0-0x0000000074C71000-0x0000000074C72000-memory.dmp

    Filesize

    4KB

  • memory/2580-1-0x0000000074C70000-0x000000007521B000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-2-0x0000000074C70000-0x000000007521B000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-23-0x0000000074C70000-0x000000007521B000-memory.dmp

    Filesize

    5.7MB