Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe
Resource
win10v2004-20241007-en
General
-
Target
15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe
-
Size
78KB
-
MD5
06c8b813e05563d88783ac17ddf078a8
-
SHA1
44b860c38f565f0d6be43832b2e793020fe7f611
-
SHA256
15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8
-
SHA512
22687eedd4218c8ea03b1cc9e898c6e5e9048fdc2ee0973f016c22b4421d35956161c399dbf59117af39522e8c6fa9f28ebdb59bf0d45f4e01b46d433249f5fc
-
SSDEEP
1536:DPWV5j/vZv0kH9gDDtWzYCnJPeoYrGQt9629/5R1gmY:DPWV5j/l0Y9MDYrm799/lY
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2752 tmp97AD.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmp97AD.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp97AD.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe Token: SeDebugPrivilege 2752 tmp97AD.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2704 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 30 PID 1204 wrote to memory of 2704 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 30 PID 1204 wrote to memory of 2704 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 30 PID 1204 wrote to memory of 2704 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 30 PID 2704 wrote to memory of 2260 2704 vbc.exe 32 PID 2704 wrote to memory of 2260 2704 vbc.exe 32 PID 2704 wrote to memory of 2260 2704 vbc.exe 32 PID 2704 wrote to memory of 2260 2704 vbc.exe 32 PID 1204 wrote to memory of 2752 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 33 PID 1204 wrote to memory of 2752 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 33 PID 1204 wrote to memory of 2752 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 33 PID 1204 wrote to memory of 2752 1204 15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe"C:\Users\Admin\AppData\Local\Temp\15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\84zpup8i.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9A2E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9A2D.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp97AD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp97AD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\15ec19f68e9851b6858a4aa80908254e01c4c6f49eaa47a72bec20af7a03caf8.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD59ab3b3d4170b976872c042b831dafb9a
SHA1fd33c0cfa3488a95c85bb8b72b273cb39379109c
SHA2565f5898cb7a68244723d049dd69ea63cfb9f155486774e178e51674a001aaa94e
SHA512e286f024f278a0c421f22cc1e3bb1b52da7623dae3cb9f29ce8ae153d8c473a8308b4028e919d789534f23efaf6bb7c5585809dc6ca01b65da157c33190c772c
-
Filesize
266B
MD55a681e132f733bf995e5dd93d5596638
SHA170633d468ca9cc6c2ce15ace101bd261dc801716
SHA256832c1c77fe8662a7446789fa11bf6116b92065b8fe2c8758626f08a4b826ed7b
SHA512659f485fb852641f70b3e36702f46984c90ba3de0d307646e070acd970dc1590a635c98d30d809d40789a8459d7ecd373ca95d96c4a45cad10ae92b83f6fea6e
-
Filesize
1KB
MD5dc651b90f76a2f013ac223fa17bd8cbb
SHA1e7fc8550b6ecf1a15d2ddc4646a40aaf24adcc71
SHA256a001fbd2fd5f747b8dd85f127a3edbe762ed8695b14803c4c405a2826e2908da
SHA5128ced3368799af2964c43a58ac1595b3cd59fddda46c95a0d46796cea017db980ffd09ed2dbad66299f97eb5ee24cdd700da74e88ca3b71c30c0d6e7512966486
-
Filesize
78KB
MD51873ea4679f9d51e28844157545a5031
SHA18bf99c969bf3578723c93b5105e1befb02654a36
SHA256ae0b43765f1a0f14b6851cbc0e3ffbf4a900b8eff4212340f6cb69798bafffb3
SHA512c74dcacc497e92f7800d6a04f14d71d65f787d8c74ac283cf045734cea65612d2807e3eb2752b8a0d63b024f460302a54c2c047da6b3fdd33eacd24219280faf
-
Filesize
660B
MD5bf54b85ec6aa58152fdf18d821bf9184
SHA12131ae5983c8f20e230ea9e9491f18d3063ebc5f
SHA25652d1aa28ed4aa274b9e66cc5ab4cb0112dc9e8d411967836e5c75ef3d432aa01
SHA512d64f2ec243349228bc94c05604a9f5aac1cdb67a216f7c4c54675ddb673c315bf702c4a169a626c5a337c5e123eab3e6d32f22d053dcee5389070c6bbfb8ae46
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d