Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/12/2024, 10:08

General

  • Target

    0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe

  • Size

    78KB

  • MD5

    c12627e95afa28641ab02f70fe8de18c

  • SHA1

    e8a0e47f4aaa342977705427463117971c9b9309

  • SHA256

    0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba

  • SHA512

    fdcce2ec2ee74c0fca3065d028e6c9b5ef8a1278d99224ba637734b7faa9a9a47a630312c2e43521fcbfd31dba12da7468bdf7176ace7f9b27c5bdf54c3e5a54

  • SSDEEP

    1536:bRWV5jEdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6F9/7Y1ei:bRWV5jzn7N041Qqhgt9/7E

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
    "C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g2gjjt9o.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2F6B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2F6A.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2684
    • C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2816

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES2F6B.tmp

          Filesize

          1KB

          MD5

          271af21d63c5d854a5a15185e353372d

          SHA1

          30bcb302902b002cdd72e6397a7bbb2b10a56a70

          SHA256

          20650a118b7129ce0c62b54e66d6df3253a1853ee2d501fae5a4eb8da5029f2a

          SHA512

          60e93a6f2ce2d6a596086a2e435040be8c5230647dfff6c9c02c7a599152ab8cc3cc2e4a93ca29e0327109e4ed1617eb1115171510f823ea56faa9e79f96a348

        • C:\Users\Admin\AppData\Local\Temp\g2gjjt9o.0.vb

          Filesize

          14KB

          MD5

          32481d1db6721046400365c024e7c6ff

          SHA1

          a12b00da7850422a929702576e21133c25ff7778

          SHA256

          3fe560ac98bda23e3de8e7e77d8afece7746db8d4f5d2f8a79fb915506ed7e4f

          SHA512

          6f43c0b1b4a5056a196c18d66a3c0860bcef4e473566150bf6f9c81769cb65cb54f50d2623b00c2c1d9661fe36f4d69144588586f0b0f78d2c4db4c1a6c5f1cf

        • C:\Users\Admin\AppData\Local\Temp\g2gjjt9o.cmdline

          Filesize

          266B

          MD5

          1d0ce1d19bd796ff16e6d09815b1f616

          SHA1

          6690d4735d69edff79eaaf8b461b3a537ed05e77

          SHA256

          b45b4153b0a8db551f6015c854af33c12bcc2f037823223009688a3f12a31290

          SHA512

          adc69aa4338135bec5ae9383ad78864c9d6e2cd9ab48b525f673abb493f601f9aa172b6083fcaba0d08ce856e44ee740bc6a061e0d363f49bb908844608a4db2

        • C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe

          Filesize

          78KB

          MD5

          32f40fa7c27b5c8b5255e15abd2399f9

          SHA1

          24532108546f5a463de6aae20ad4199e8c80094b

          SHA256

          dfea1f5026bb69de9392bff9c66e932ffd371b437bda6f97f3efbbba077d5a99

          SHA512

          7e08e4ccc9c7d315f9a526e4afac19af1ea7b5000a4ab992937ea0f48aca11e130108e8186a91b532c5134ea9d5d8b63fe3a686cf5cb916dc256e70bc58d7cdf

        • C:\Users\Admin\AppData\Local\Temp\vbc2F6A.tmp

          Filesize

          660B

          MD5

          bb999d0e2d2f879c7486dd5cb369a594

          SHA1

          6f2158c0eb01f1af24d29d94fb33ab666f9f836f

          SHA256

          63e11863925c61ef9b618b1467b5b8e2abdd6ee5eb1c307fb6348a021dc424f8

          SHA512

          3e80461838e4ab6151def90c5e9b73e78424e7d9daf2111c7f057010d693509e3ea7f3f12441c6ca3d29f33b5d80dde04a944e44cab470ab99ff637fcbd938d4

        • C:\Users\Admin\AppData\Local\Temp\zCom.resources

          Filesize

          62KB

          MD5

          aa4bdac8c4e0538ec2bb4b7574c94192

          SHA1

          ef76d834232b67b27ebd75708922adea97aeacce

          SHA256

          d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

          SHA512

          0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

        • memory/2660-0-0x0000000074351000-0x0000000074352000-memory.dmp

          Filesize

          4KB

        • memory/2660-1-0x0000000074350000-0x00000000748FB000-memory.dmp

          Filesize

          5.7MB

        • memory/2660-2-0x0000000074350000-0x00000000748FB000-memory.dmp

          Filesize

          5.7MB

        • memory/2660-24-0x0000000074350000-0x00000000748FB000-memory.dmp

          Filesize

          5.7MB

        • memory/2800-8-0x0000000074350000-0x00000000748FB000-memory.dmp

          Filesize

          5.7MB

        • memory/2800-18-0x0000000074350000-0x00000000748FB000-memory.dmp

          Filesize

          5.7MB