Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 09:19

General

  • Target

    a0285912de9fce2420a293c4267c673aea25e2ccb63f77724945a94f8f2fc984.exe

  • Size

    78KB

  • MD5

    b4b4257cfea36713853a7b0c4a3d1c81

  • SHA1

    4cf4d54573163b978bcaf82709ca06e925de3adf

  • SHA256

    a0285912de9fce2420a293c4267c673aea25e2ccb63f77724945a94f8f2fc984

  • SHA512

    1af741d593130d07e8b21839d353c90fe4afc42018ebd60bf464b18fefde2e4563f697c10d7f77dcaa12880e9ffaa813616c27fe493ab25ef72c86e476205dd5

  • SSDEEP

    1536:nPWV5Ndy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN6h9/S1VWQ:nPWV5Yn7N041Qqhgi9//Q

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0285912de9fce2420a293c4267c673aea25e2ccb63f77724945a94f8f2fc984.exe
    "C:\Users\Admin\AppData\Local\Temp\a0285912de9fce2420a293c4267c673aea25e2ccb63f77724945a94f8f2fc984.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yallx_m7.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9EEF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD5ED510E6162430689F784E4CA837C25.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4764
    • C:\Users\Admin\AppData\Local\Temp\tmp9DF5.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9DF5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\a0285912de9fce2420a293c4267c673aea25e2ccb63f77724945a94f8f2fc984.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9EEF.tmp

    Filesize

    1KB

    MD5

    f9a89c5a53b60c5d87b9aa10d324ee8f

    SHA1

    f6e3dbc816aff136d4fba4927771c623095770f9

    SHA256

    549e9e4a16600a0dc349a71abb5b28525bd6fe73eff5ca176d867f46af8a3cb7

    SHA512

    f398945372521ac23f2782fe99c2ca54cacb0c21e683b04dbdc2c5e7f61e653016a5e961b1650959e5d10786a3b10b0933c676c123ba323d15ed2d44ba911acb

  • C:\Users\Admin\AppData\Local\Temp\tmp9DF5.tmp.exe

    Filesize

    78KB

    MD5

    48a9c9bd8ee19e9933bb472d302c98b8

    SHA1

    901ac1a008e01b6445109245a60c9848df6d07b1

    SHA256

    a79e9ae18d2a799168477f2baadb9d8c1d3fd8a572b9e4dda6e0531dec9cf741

    SHA512

    2abadc5f4845e24478ad2cfbc53e14de5798d82580ddd7be56b752d88187571b9d399b141da1c39efeeb0d95b9fc45a0e22cbc0440fe2346124d2ccb623faede

  • C:\Users\Admin\AppData\Local\Temp\vbcD5ED510E6162430689F784E4CA837C25.TMP

    Filesize

    660B

    MD5

    22a4ffaab76b49ac353f69954b3de208

    SHA1

    2998133c3d3e6f48d95bb6c3815d1524ec58d0cc

    SHA256

    b960e6cde8b41136eabf168078aeea7605d96eea4effd93c32af4669c5c4c5f9

    SHA512

    86677b76dfd043563bcd4aa3137e7cc200640ec7fa76b973bf5623e13daddebfc64c7630b5be195a87c8a16ae2b8f40f12b0c528f1ac6d57dc0be4b7deae4349

  • C:\Users\Admin\AppData\Local\Temp\yallx_m7.0.vb

    Filesize

    14KB

    MD5

    6c229de9c8a57b725b9528fe358b2972

    SHA1

    19ad39407613dbd08848b717d495f51d9df35fe1

    SHA256

    d39add1c95e21e120f00a7be8aa54f1c4921b7fe75ba76ce9a8b339181355015

    SHA512

    efe539b6861dbe7e8a186d5f8a30f037114c28763113b7d9e516b0b2da8c03a5573948993b5e7f39d5574f3e93801911822326b3464da015a66a6411d0f5d770

  • C:\Users\Admin\AppData\Local\Temp\yallx_m7.cmdline

    Filesize

    266B

    MD5

    85dcb7f147f63d6c2b42bd10b0d94cbb

    SHA1

    4ef573d1e5dae5cf558d9dc7315d20e1514557bc

    SHA256

    cc424ecd67ba1a7f190791ff57486a3bf3fadc59227e9f1dd50f8265635bf9bb

    SHA512

    e18d50d000b3f3655865b0dc68e92bbfde9ed7708cabef64815a2124daf4e7967d46d98f39ded47a203273206d07d16be49352316489b2d24b1f58f23ca0cd11

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2936-27-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/2936-26-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/2936-25-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/2936-22-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/2996-8-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/2996-18-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/5000-23-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/5000-0-0x00000000746C2000-0x00000000746C3000-memory.dmp

    Filesize

    4KB

  • memory/5000-2-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB

  • memory/5000-1-0x00000000746C0000-0x0000000074C71000-memory.dmp

    Filesize

    5.7MB