Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 19:21

General

  • Target

    05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe

  • Size

    78KB

  • MD5

    fe5fd1aebf88333927fc34b2009fec09

  • SHA1

    6d2a89beec9b3b87eaeb2f0a6a448c5cf17c6344

  • SHA256

    05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70

  • SHA512

    cb05e74600ac668f8e4e7f0d55a6927125f5113f2f1fa3bb90d1ecc7e4d62ef65753ce849a068781d828b5c39fb3f751e83e80c3b5ca28c74cab0997425ad126

  • SSDEEP

    1536:jy5mXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6+d9/+D1YI:jy5uSyRxvhTzXPvCbW2U89/G

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe
    "C:\Users\Admin\AppData\Local\Temp\05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3vbsn5ub.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE51.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBE50.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2432
    • C:\Users\Admin\AppData\Local\Temp\tmpBDA4.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpBDA4.tmp.exe" C:\Users\Admin\AppData\Local\Temp\05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3vbsn5ub.0.vb

    Filesize

    14KB

    MD5

    b43ec63d7b50fd3ab45bcfab5caa6747

    SHA1

    867496f1300d785c4061d480b3beaf0ffeb73e33

    SHA256

    ae1d67fba39450259b13a0ae1c58b94641bea10c054f494f2597dda6e2697681

    SHA512

    1be4701aca0c2999dcf040758f578301134f620fe10f241b9f1ccff924e913f25a77bed4bd892c5c93b7c56e89ad6f41ede083ed84c4074994b6b3d583921189

  • C:\Users\Admin\AppData\Local\Temp\3vbsn5ub.cmdline

    Filesize

    266B

    MD5

    09373fa6bb90945aff5d12e7aed33a19

    SHA1

    f57ef808a35ef709809c6f9e09a206864ecf37fd

    SHA256

    fbc4f7c488a5d05ba97735f784b0ca604670dc4fdc85d44161a51393a9e0dcc4

    SHA512

    7cb91fcf1675158fb088186387246c5eaccb1adaa6313e7bf3cba322f2c38bb3568f6467a86f7404c27039a748aabac3c7ac10b6f0c80724650a4f189c5c4b5e

  • C:\Users\Admin\AppData\Local\Temp\RESBE51.tmp

    Filesize

    1KB

    MD5

    98bdd3ea331132916a5d5d16af91c22c

    SHA1

    55d4b6fcaebec5651c9814ebe9d6d62194ceaa1f

    SHA256

    da1e812b4b3b5d687b4ce8414fb81cad3ead72d511bd337c8617910ad36ee8b5

    SHA512

    6bd0938765cf0984612962e0c55ed595fbb1d575698c0c6ee412fd4ab3f5aca7cec57800b05af84402d1c2472384f85e24dc015fa85d8fe2573ab6fbbd84f11f

  • C:\Users\Admin\AppData\Local\Temp\tmpBDA4.tmp.exe

    Filesize

    78KB

    MD5

    0b59b98366ee02657ac7353482fb4f28

    SHA1

    595b78b49bfb1aa92b9721f52214fa57cbd01dc6

    SHA256

    1f2c06e513fc0c13e4c904f4ca7627de72981cddaf1dbe01cb3b2c6e52638d45

    SHA512

    c802405e133ad2ae9dcac70efb8826508fc21acb7e719d5ac7e50bdac37e97607243641e5838de08518dbb24104baa4c06cbc27ed16d664afed5b80399998226

  • C:\Users\Admin\AppData\Local\Temp\vbcBE50.tmp

    Filesize

    660B

    MD5

    0367913ce1a61a8196b3e03702241fed

    SHA1

    131442387d05384a653137da9f72914ed8cec0b4

    SHA256

    260abb72c59bd3e6e8521305e012dc29926f4d77d3cb1a03dfbfeabac32ccece

    SHA512

    2620d29c75a41079e51c41d759c2c0c23060cecd218e20cf31d2f5b41b3c66122ca33f4f889174e7a27c7d8621652ff466af8473dc902e23c2458abd27470540

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1500-0-0x0000000074881000-0x0000000074882000-memory.dmp

    Filesize

    4KB

  • memory/1500-1-0x0000000074880000-0x0000000074E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/1500-2-0x0000000074880000-0x0000000074E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/1500-24-0x0000000074880000-0x0000000074E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2152-8-0x0000000074880000-0x0000000074E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2152-18-0x0000000074880000-0x0000000074E2B000-memory.dmp

    Filesize

    5.7MB