Analysis
-
max time kernel
103s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe
Resource
win10v2004-20241007-en
General
-
Target
4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe
-
Size
78KB
-
MD5
01658283871862263343db8c80526e20
-
SHA1
7304d9cf47d70ccd9a54892e53205ce8ed86d33e
-
SHA256
4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9a
-
SHA512
3b62bd87ffd3910484728d3e21f2c7d759b823b0575ff9773ab33010581617e38646d3ce1733d4f7be80a26d7c72483720e86961803431364ad97a53f2693e66
-
SSDEEP
1536:UPy5jS6vZv0kH9gDDtWzYCnJPeoYrGQt96g9/qT1y+A:UPy5jS6l0Y9MDYrm7f9/qXA
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 tmpAFE7.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmpAFE7.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAFE7.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 552 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe Token: SeDebugPrivilege 4024 tmpAFE7.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 552 wrote to memory of 2300 552 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe 82 PID 552 wrote to memory of 2300 552 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe 82 PID 552 wrote to memory of 2300 552 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe 82 PID 2300 wrote to memory of 1100 2300 vbc.exe 84 PID 2300 wrote to memory of 1100 2300 vbc.exe 84 PID 2300 wrote to memory of 1100 2300 vbc.exe 84 PID 552 wrote to memory of 4024 552 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe 85 PID 552 wrote to memory of 4024 552 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe 85 PID 552 wrote to memory of 4024 552 4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe"C:\Users\Admin\AppData\Local\Temp\4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yujyadia.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB1FA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2BB46FC133E24373B3131013822342AA.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpAFE7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAFE7.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4827e34eeab28b1a411dba762296ffe236e9bd5f256443902037c0bbaa20fc9aN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5798037953087d144d1a7107db727eff7
SHA1d1d135a7582b713efbe4710730739f39d24fcccf
SHA25685b3448719c3a07dce20ec4510966d515f3a978e3153bc48c5b5d819991ebe70
SHA512aac68930747a94068c50f2deea838cd56a620bac434f3b6b72c315e11ac7a094a273d5d7f8df70f4c6c4aac379ef498e59dad58e99154660682fde0e391447de
-
Filesize
78KB
MD5a5485be7a0785578307e95979e79d7dc
SHA1f432ef99583a440023b3e6abbd3c27f37de229d9
SHA2567dd58eabc525611b31dd83590424f4833f38e419d1dc412e92d749fc5ecfa543
SHA512a94eda715ce4c423760b4d91da9e477c297b38802219c528677d010b854acf11ed1628ff41f51f6bfce3f3ea65f61787362396bae644a7c9ca5ccfd8b749c89a
-
Filesize
660B
MD523a8b4939af32a5546ca48cbf575538d
SHA13ceca127427eec3a57da63dbac9519b57b13bcb5
SHA25609c68632fc2ab0fb0aa96449f51351bfd5aaddc8ec343a4d946db6c9ffb48874
SHA512c7108d3753d00074ffa8ebdb3e1fe03345e97641ac1f7f5408bbe38896e2c206b57d512eee401d533f9a6b94be432939b5e27101e83539207bd5120b3da4ce82
-
Filesize
14KB
MD53bc2177ff602687e53bfd74c4b34c5d3
SHA1593b71231d34a4c3440d55c226f9d2629adadf56
SHA256be8952581d51929ce93a017371704fd8c1da07047e794bc0c67abb91978e99e0
SHA512bd66c52d78744df97a84cc872505127b634ea65d8e1fb18d55871881ac2efdddb506090e664f170e19d4e5e81da3213452ccf1af086f49065e173ec4f10e8394
-
Filesize
266B
MD5ea4c857e1c063107ce5e9b98366ca3c4
SHA138601a5e3f3fec25a0bf9516ae70c8d71de23547
SHA2561b6fe3588b77dbbedec1e6913e4ed815a89f2d4e804c910d12665693d80a451a
SHA51204a848cb8c601b65883727779527fd330397451eff3f444a3d32ae8a95946359893902788030f539496d2d6795fcd7ccefa8c1a48771985f6fd87ddd2797604d
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d