Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 01:21

General

  • Target

    6be68aa963e0002cf776c791b2fb5386c81d5c2d0f074b6688759bab02461586.exe

  • Size

    78KB

  • MD5

    2d1040cbb7d90db8d32d9e9d98cfe41c

  • SHA1

    b20f3369032316407495a6e6a032033549417a48

  • SHA256

    6be68aa963e0002cf776c791b2fb5386c81d5c2d0f074b6688759bab02461586

  • SHA512

    29326b444beef438e5923e5c4750e14f71112a43340d340c74bec258e29ce598e4dc20cf93c5a2b893bad940b645e8221df7f9557267013c9e383ac9a68caa90

  • SSDEEP

    1536:VVe55AlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtd6TS9/D14qU:3e55AtWDDILJLovbicqOq3o+nh9/5U

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6be68aa963e0002cf776c791b2fb5386c81d5c2d0f074b6688759bab02461586.exe
    "C:\Users\Admin\AppData\Local\Temp\6be68aa963e0002cf776c791b2fb5386c81d5c2d0f074b6688759bab02461586.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6rkgqhpu.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAB0F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAAFF.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1680
    • C:\Users\Admin\AppData\Local\Temp\tmpA94A.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA94A.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6be68aa963e0002cf776c791b2fb5386c81d5c2d0f074b6688759bab02461586.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6rkgqhpu.0.vb

    Filesize

    14KB

    MD5

    5a93c2a8e8ccf2ea57739651118647c5

    SHA1

    5aff8609710d0fe34599b4f1828b7968754d3751

    SHA256

    02289fb76541d30606614df6889ccb618c24f922498c1bb34ced5f6e65f6d2bf

    SHA512

    fcde2d1140a6191a1a54987b3792b6bc71b3e7c10803072adcfe7f83a5bea1e47d983f8b560ac13bcad286b493495fb37930a6b6106e77481f37a7db5b0f48ec

  • C:\Users\Admin\AppData\Local\Temp\6rkgqhpu.cmdline

    Filesize

    266B

    MD5

    2fcf84dd0906d0542ad3aa809d130005

    SHA1

    f3c639d2a8d4477d50bc8bb7fc6b7a18ce2f64dc

    SHA256

    b2edd68de6435acd378769088bd3b02e71cc29ac875d2bec738ca648cbe1154b

    SHA512

    c3d85ba21a5d8f727786cef8c0ff05fb790bb979a68ef8a1e50fe453843a135392fa293926f76f8b526e62c270c6e789d0f5fdaf7899d80954c2de360a6b325e

  • C:\Users\Admin\AppData\Local\Temp\RESAB0F.tmp

    Filesize

    1KB

    MD5

    d7cef7ba0d981ed21cdee2a7aed94963

    SHA1

    a3e0bbbfd40b6074da1f60d6d018fd766b483d23

    SHA256

    932852ae5240b6959053ee4ce71668850d2790e67da36c5cff79a94c7ac463ba

    SHA512

    a69a086d0d6db6f94e5c494bc98cd218fdcdc1f3895425ecd469dd87941ba459684c740513dd14612f5c00be5201012cb7a63c32e671fe48ee6fdf1487d94f17

  • C:\Users\Admin\AppData\Local\Temp\tmpA94A.tmp.exe

    Filesize

    78KB

    MD5

    55aa4d8c1ab6570a450f3377029ef1f0

    SHA1

    46296b49d267d3564387e82426d1e26519b8451d

    SHA256

    5125ce39ca6e509b534c080668f422f87fc443e6154388d4ea418c8a0b4337e8

    SHA512

    f4a9791fd5d77070db80eb0b07f1baf67f15f5b1feb4490f76286687ce369363faca8b1ce6ac886724f284e134ed02be945a76aa28c7c759fb9247f2f6143b70

  • C:\Users\Admin\AppData\Local\Temp\vbcAAFF.tmp

    Filesize

    660B

    MD5

    161407f282bb37abbaf5cd8d9d155a3d

    SHA1

    494c51b03d9829c82865fe57d8eecc09e660cab6

    SHA256

    196e7043276a493bbc9db598a24ee0de294f7b22aea920a123bd2ff1077ff49b

    SHA512

    89d04b68bf7af59ef2b76d2d7a2b4b8a6f04d3c796b27dc5b10558272b0df3801df92b4f800cb00022e6c465cad43a7a89080607874bd4472bf654fb812c11fc

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/1820-8-0x0000000074D80000-0x000000007532B000-memory.dmp

    Filesize

    5.7MB

  • memory/1820-18-0x0000000074D80000-0x000000007532B000-memory.dmp

    Filesize

    5.7MB

  • memory/2036-0-0x0000000074D81000-0x0000000074D82000-memory.dmp

    Filesize

    4KB

  • memory/2036-1-0x0000000074D80000-0x000000007532B000-memory.dmp

    Filesize

    5.7MB

  • memory/2036-3-0x0000000074D80000-0x000000007532B000-memory.dmp

    Filesize

    5.7MB

  • memory/2036-24-0x0000000074D80000-0x000000007532B000-memory.dmp

    Filesize

    5.7MB