Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 19:21

General

  • Target

    05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe

  • Size

    78KB

  • MD5

    fe5fd1aebf88333927fc34b2009fec09

  • SHA1

    6d2a89beec9b3b87eaeb2f0a6a448c5cf17c6344

  • SHA256

    05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70

  • SHA512

    cb05e74600ac668f8e4e7f0d55a6927125f5113f2f1fa3bb90d1ecc7e4d62ef65753ce849a068781d828b5c39fb3f751e83e80c3b5ca28c74cab0997425ad126

  • SSDEEP

    1536:jy5mXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6+d9/+D1YI:jy5uSyRxvhTzXPvCbW2U89/G

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe
    "C:\Users\Admin\AppData\Local\Temp\05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tmj1darl.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3204
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5EE9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF3F05F27A99A4A189F29E8FFAAA4140.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1204
    • C:\Users\Admin\AppData\Local\Temp\tmp5D52.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp5D52.tmp.exe" C:\Users\Admin\AppData\Local\Temp\05fa5400ef8c49ea8fd3aab5ae92b9cc0645e347ba7d76c1e02060e7b6d5fe70.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES5EE9.tmp

    Filesize

    1KB

    MD5

    f39e1ed43b379d1b6ff25b6bcca6f0bd

    SHA1

    7bc7d88d035173bbbc6600f2d0323e98c21f44cb

    SHA256

    e6225f47ca899506269ad255dccdd47f48a6b24354704d0fbe40ada24ad6faac

    SHA512

    3648bc1f37fae17dbc7bf48dc19b413774f441febed23599c86a1490890f9bdb90166252fafeb5d2422fc1454a458a2c1765523940759c74210598611fc1a89a

  • C:\Users\Admin\AppData\Local\Temp\tmj1darl.0.vb

    Filesize

    14KB

    MD5

    99cb581713b8e091d5a0ae34cbb2a531

    SHA1

    1dd47f9b3ec8808222a98b35b04c7aa917c8ea76

    SHA256

    ab11e810e505094870b92ddc22762535da8cc5974f677a0c08ef61aa93fa2b66

    SHA512

    301eaca1ede35cf65a392743e73de07c02f9de12369ab475a4470742890214e8a1489d63dcd205658ef2e278a6b7b916781fad1e6ca11a6ea700121e5d444d7e

  • C:\Users\Admin\AppData\Local\Temp\tmj1darl.cmdline

    Filesize

    266B

    MD5

    d87b74678441a1a83edf3a1544ff1510

    SHA1

    03bd65a5f81e07523bc0a15693455bd2abe49f70

    SHA256

    daa9e8e4f0bdd14a5d2981d9ba2f0d14f6960022b900c0e92fbac91742c81c2e

    SHA512

    b9e4d7c4f336694bec78a57a30e26e3ad5c8fecf3176a7df3155011bfb1459e3a372f3654040f823389523e79ea19f7b3c8b50f13e580c6fd69156bbc7c8572d

  • C:\Users\Admin\AppData\Local\Temp\tmp5D52.tmp.exe

    Filesize

    78KB

    MD5

    f2514b4fa1904d80002703f93b1eff74

    SHA1

    d58ad2ee17f45e3e8a0376d886092c60c1d34079

    SHA256

    95d7f79880c079827bc37dc24f7e01ae01569be067c8d2b42e142af741cc2a11

    SHA512

    6b0e4186b227c7bc323aebf5650bc6b9cdd24a8ad4755eb85ad890c29b543761874fc1b3060e82631dbec598f06fd5a1f190998186d51a9608085191640fa493

  • C:\Users\Admin\AppData\Local\Temp\vbcF3F05F27A99A4A189F29E8FFAAA4140.TMP

    Filesize

    660B

    MD5

    dcd792534d0e70a8dedbee349315a188

    SHA1

    62f8212058faf92da2bf50d572ba69d6560bd494

    SHA256

    ce8030ec58858ed63ce350e80791e52ad3d87579d54fb31eabfa2fe74976ff43

    SHA512

    ffdb72283a7702d100b48981164a94f2380a8a0dcc17b26e4deaeaa468972f8850747012dff37223c3743293764bcc43942021e853c8d57ab4837416b0c9fdd4

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/220-1-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/220-2-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/220-0-0x0000000075042000-0x0000000075043000-memory.dmp

    Filesize

    4KB

  • memory/220-22-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-25-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-23-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-24-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-27-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-28-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-29-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3204-9-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3204-18-0x0000000075040000-0x00000000755F1000-memory.dmp

    Filesize

    5.7MB