Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2024, 09:06

General

  • Target

    fff5930f5eab2587edf16567fbcc104a6ae0d01d53a7542178a626b7103e65d6.exe

  • Size

    78KB

  • MD5

    b76a31ddb76c64289d387a0109d2f5f1

  • SHA1

    7e709a34a7943dac03f37eb38a6782714919cae0

  • SHA256

    fff5930f5eab2587edf16567fbcc104a6ae0d01d53a7542178a626b7103e65d6

  • SHA512

    e761bb8519c80314abbd73d79561ffddf271938af2810d04c3b2b1c84879b53d0f24ea50628e2238581a3bebdb1ee6690d169e45447ae64cae7be3f740ecb231

  • SSDEEP

    1536:ctHF3rdELT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQti9/411q4K:ctHFbdSE2EwR4uY41HyvYi9/uK

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fff5930f5eab2587edf16567fbcc104a6ae0d01d53a7542178a626b7103e65d6.exe
    "C:\Users\Admin\AppData\Local\Temp\fff5930f5eab2587edf16567fbcc104a6ae0d01d53a7542178a626b7103e65d6.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ifbn2jdw.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4B92.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4B91.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2784
    • C:\Users\Admin\AppData\Local\Temp\tmp48D3.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp48D3.tmp.exe" C:\Users\Admin\AppData\Local\Temp\fff5930f5eab2587edf16567fbcc104a6ae0d01d53a7542178a626b7103e65d6.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES4B92.tmp

          Filesize

          1KB

          MD5

          ae813fe28438f90eaf4102d3d28278b8

          SHA1

          2ce35bec30a606b1b9d978dfae768f767ecd54f1

          SHA256

          a6e1f8b102caa8bc60e0dab0f6521bc8061788588f59ffdb15965214bfd3aec7

          SHA512

          209fc27215d47fa891e89aa8e5f9bd143e4512c5442e8d02f9380b23316d91ce8d6aa0597c527a70ad31f449889d2b3cce120f70bbb267ce2b0896eb55389990

        • C:\Users\Admin\AppData\Local\Temp\ifbn2jdw.0.vb

          Filesize

          15KB

          MD5

          9bf0c822e1dbad064a89b6fea2dc70b3

          SHA1

          0d0a29d0bd803d4d6a161ad5b5de569f67b534ce

          SHA256

          07d60788579f9b1b13811e6a2257508813f9271e72ef3aa5210c1e030f3ef4b2

          SHA512

          97796960eef48728b5931bdec86ccbdea031c5a6b093455c01df2b6b4c72b7e2c6fdd055d6b046ea6b7bec023c1438c18eaed9ee9eeea6ee9845b51b487f83ec

        • C:\Users\Admin\AppData\Local\Temp\ifbn2jdw.cmdline

          Filesize

          266B

          MD5

          df4f47d42ccaab96b2cff57eb8ea61f8

          SHA1

          f5bb0c9022ec8a5d54b8b2a360a222075a82c029

          SHA256

          891af9b6a18d7e55ec1d94765fcd6f7e29c73d893d000189b6c36085a0a75973

          SHA512

          0d366ed9d1ad96faf58e1ca68e652033d294f26fc3783ffd6498109ad6de4051b4e786e97dbd1ccadfccf2edc8eb88c9fa6e51f4c8183ad6a0c0207087721762

        • C:\Users\Admin\AppData\Local\Temp\tmp48D3.tmp.exe

          Filesize

          78KB

          MD5

          18217c9356c2ac8b3eb5d80609be9a2f

          SHA1

          41269b4634145c34b16adf89cce22e3c21585ed4

          SHA256

          e3de77247cf6152fa40da54ece7e6b778401253be6aca995dafdb122d80325f2

          SHA512

          75d98a0edf1356cefcd813c9b0e3bfa038a99449b0dd84e14d6e1ff1e4bd094f416f6183927cc319e6fc4222bc5aae228e3ecef66a58c8ab98af2a7ae302660e

        • C:\Users\Admin\AppData\Local\Temp\vbc4B91.tmp

          Filesize

          660B

          MD5

          0a71d1b2f5045ea7aaf627b492fbc27f

          SHA1

          5489b877496c86a10e040dd7b9c0caf57c1ad985

          SHA256

          683c498e581bec1342e897ead353cefe3dee79a39ef2dcbac91c122f3dde2df6

          SHA512

          dbeb1adb07fa88d9526677ee51259119aa03c281a238505fa5696f79a642e9be04c216a364be9c802b3149d29584eefcd43bb4ef1440ffb991c9213b469b7bc6

        • C:\Users\Admin\AppData\Local\Temp\zCom.resources

          Filesize

          62KB

          MD5

          6870a276e0bed6dd5394d178156ebad0

          SHA1

          9b6005e5771bb4afb93a8862b54fe77dc4d203ee

          SHA256

          69db906941dec2a7f1748ea1d15a058751c77d851ce54ea9e2ebdf1d6c7ed4f4

          SHA512

          3b6f412d4bdf0939677ab6890a6417da6f737376e13375d2a60871de195aa14344b8340d254b819c850d75a443629cbf26f35533e07aaba9532fdc5284132809

        • memory/2640-0-0x00000000741D1000-0x00000000741D2000-memory.dmp

          Filesize

          4KB

        • memory/2640-1-0x00000000741D0000-0x000000007477B000-memory.dmp

          Filesize

          5.7MB

        • memory/2640-2-0x00000000741D0000-0x000000007477B000-memory.dmp

          Filesize

          5.7MB

        • memory/2640-23-0x00000000741D0000-0x000000007477B000-memory.dmp

          Filesize

          5.7MB

        • memory/2808-8-0x00000000741D0000-0x000000007477B000-memory.dmp

          Filesize

          5.7MB

        • memory/2808-18-0x00000000741D0000-0x000000007477B000-memory.dmp

          Filesize

          5.7MB