Analysis

  • max time kernel
    117s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 21:24

General

  • Target

    dec8e32fd5df89f225fb6636754bb64f89a5f13aab9c86ead97a8c3d0da85281N.exe

  • Size

    78KB

  • MD5

    77db9ca347d27529c84880d61c5224c0

  • SHA1

    fe0af9bb2832c266e870445ecfff177f08666bd0

  • SHA256

    dec8e32fd5df89f225fb6636754bb64f89a5f13aab9c86ead97a8c3d0da85281

  • SHA512

    1597c24a81d5ab6ff05e6d3ba9668b004d1b89bc127b0e53ef9c4cf3061dd5e6bf5c9655e1d293d60886d78ab06b6633e7635f45f5b8017485a871a95ec8de41

  • SSDEEP

    1536:3c5XXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6H9/E1xh:3c5HSyRxvhTzXPvCbW2Ug9/a

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dec8e32fd5df89f225fb6636754bb64f89a5f13aab9c86ead97a8c3d0da85281N.exe
    "C:\Users\Admin\AppData\Local\Temp\dec8e32fd5df89f225fb6636754bb64f89a5f13aab9c86ead97a8c3d0da85281N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ofkgokyv.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3264
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCD04.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCB7164B611124D38925E9239B65A7381.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:444
    • C:\Users\Admin\AppData\Local\Temp\tmpCB4F.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpCB4F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\dec8e32fd5df89f225fb6636754bb64f89a5f13aab9c86ead97a8c3d0da85281N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESCD04.tmp

    Filesize

    1KB

    MD5

    795fceaea997afe537ce1e5e84808f99

    SHA1

    f308585cb6cb936a79f742d391d396f8e15c2991

    SHA256

    8751f6112b348ef81c837973ad598cb377b81a3781acc2389d7b128abb6a2f06

    SHA512

    f97612c17b6c44e7322de8cb202592e1a530b6820f6580810699870c3f686d4d6783e366fb90da1b1905788e6f5db9e4bfe5bc38f72b3831048f0798d7b91c2a

  • C:\Users\Admin\AppData\Local\Temp\ofkgokyv.0.vb

    Filesize

    14KB

    MD5

    f37e4e8d23ed120b8ff53bd30aa96213

    SHA1

    8aea86f12bea47e3ff50dd5865c1cdf2eca00fda

    SHA256

    e244c88986c3c86f3adaabdfe54e09e703015d6a16a29bfa6b5460cb30fb4038

    SHA512

    7fc9edbd9bc54a93592befc90f14cb6102b980011849df81bb4be110cb6a249bc4665bb4c062e31d4d491c9dbaa2dc615bb3090146ea2fd6a575716dd90d7029

  • C:\Users\Admin\AppData\Local\Temp\ofkgokyv.cmdline

    Filesize

    266B

    MD5

    63fc78365a63f5e2c695da136e21ea27

    SHA1

    6267ffc9d7ea14bf9f9d7bd0101f34f69a7fdd21

    SHA256

    0eaf760ef46c8a65219fadfe5330bbbc8f6eb9f7c8c26fdc155bda0c85a19370

    SHA512

    9fe566970c9659662f9c1153e7637014c31a0644a989a1f6bc35728077d4c93811dc4cd2d10a544501d77c6dcb3317855a06d2b19f102c9cc8e3c914a495cc4f

  • C:\Users\Admin\AppData\Local\Temp\tmpCB4F.tmp.exe

    Filesize

    78KB

    MD5

    433793b0f582e0dc954a3a4b818917cb

    SHA1

    75bd73b04600f8a18f406f0c66ff0655cf8702e1

    SHA256

    6c65d3f63db6fece70856209ae3d6ae0df1644fcc3a84a6615b0d0cca8fce3d4

    SHA512

    ebf75f8e871ea9eb858183594cf9864c9a5f5e1204af7b31364887e9ee061f5a76b2f2cabbc2f81ad1a431ccf78deadc554d66e24322c2626ec76e1b28542ab9

  • C:\Users\Admin\AppData\Local\Temp\vbcCB7164B611124D38925E9239B65A7381.TMP

    Filesize

    660B

    MD5

    497b00def848323cd4f4b802de0b650d

    SHA1

    0098ad8664772c1b867dc84d90b25bd96967c080

    SHA256

    8bf6da422d0e30ed26e606aad78c4c05178efa22950c2dd27d3aa026afecd645

    SHA512

    0265bb50b8697f323ab2aa69fb81f01d53ebaf006be81f4dff54ada2d1ea8830a1a0c1db8a4c62ac7ea67705f362fe6f10a93940418a62b46c524cc32713b9db

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/3264-9-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/3264-18-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-23-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-24-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-25-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-27-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-28-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-29-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-0-0x0000000074BB2000-0x0000000074BB3000-memory.dmp

    Filesize

    4KB

  • memory/5032-22-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-2-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB

  • memory/5032-1-0x0000000074BB0000-0x0000000075161000-memory.dmp

    Filesize

    5.7MB