Analysis

  • max time kernel
    114s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 11:24

General

  • Target

    8ca63d2f53be90d96fd0bc8c280f35dbae3bed8fa5bdf92d0691619078f6565aN.exe

  • Size

    78KB

  • MD5

    06d06fc07d067fe9f0828d930694b090

  • SHA1

    c7b92a651f9d21968eb67b718c5b86574d3ab27d

  • SHA256

    8ca63d2f53be90d96fd0bc8c280f35dbae3bed8fa5bdf92d0691619078f6565a

  • SHA512

    e2881b8d082c779ca21e214976ca170faeb5e79087acf683b3c34cd8b36bcfe6bf99a75a1130a390273e045180068041b83626043ccda26f1b259b69ce174e3a

  • SSDEEP

    1536:KHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQteE9/N1au:KHFo53Ln7N041QqhgeE9/B

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ca63d2f53be90d96fd0bc8c280f35dbae3bed8fa5bdf92d0691619078f6565aN.exe
    "C:\Users\Admin\AppData\Local\Temp\8ca63d2f53be90d96fd0bc8c280f35dbae3bed8fa5bdf92d0691619078f6565aN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\67drhh0z.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC9D5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC9D4.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1800
    • C:\Users\Admin\AppData\Local\Temp\tmpC64B.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpC64B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\8ca63d2f53be90d96fd0bc8c280f35dbae3bed8fa5bdf92d0691619078f6565aN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\67drhh0z.0.vb

          Filesize

          15KB

          MD5

          1168fc42bd06d29887d1fab2f3959afe

          SHA1

          b8b2b8b3fe667b431191acd6f09be57b7c1ffe70

          SHA256

          45b99b4ac9a874494b45a04c71fa9003275d1cfdad0e8a9c2318c7e51a49b8ac

          SHA512

          1c73f976aaa4ec6b5828d85a241986c4942697654c8f0f94dd48a2fe7294558d84f9434ac833d15f144f0e640198deaa9343ac98708cc7dc0c6195b1e9c99423

        • C:\Users\Admin\AppData\Local\Temp\67drhh0z.cmdline

          Filesize

          266B

          MD5

          87eeffa1f11c0028f4acb4bd387d3b7f

          SHA1

          0b11f302a7d28e3ed8f4488cd91a426c477adc61

          SHA256

          b21dbf3b45dcbc4f4b1ed1da39b550bc386785bdf67f004bb57427a758e79e48

          SHA512

          86cbd8d8be203db031751105be8c1fff751af0f7d9db51981cfd1af96896f79771027bcd52cce72b510132bf2de99f3c846e91c46658e47a6f8ace929b904abb

        • C:\Users\Admin\AppData\Local\Temp\RESC9D5.tmp

          Filesize

          1KB

          MD5

          13f8fd32fd817df1a8890cc8c17cf7c8

          SHA1

          6914d44e9061b962b50d255115d90b2b510dfc10

          SHA256

          bc6957cba01aef715c88b0d43e2cfec915b120360306e634f66881988fda66a1

          SHA512

          98c554088fb62c8253f2b86a59208a97b75631cfba3cb0dd5a001a8cd8aa19a3d67177961e9c1b20e0836f9c7d0eaf147c4a91c29cce4e6ee73540fa005feb60

        • C:\Users\Admin\AppData\Local\Temp\tmpC64B.tmp.exe

          Filesize

          78KB

          MD5

          19c2db1c3487fe86576091ab8ebcd3d1

          SHA1

          a841c40e2c278211f7360cbaffc4587fe6f8dba1

          SHA256

          a04ebc209eb4ec0bff830456d4c969282393650d4dd020c00e913cdb4796809e

          SHA512

          6a0c8c585e022c29b0b08fe2d0e62a639d85b39ca1685855e042a80050a9f62d8f6846baab8674a80544fb710ead23f4423d48f29b8aeb7c7156d74ef9ec9057

        • C:\Users\Admin\AppData\Local\Temp\vbcC9D4.tmp

          Filesize

          660B

          MD5

          d548c1f050c277a0c399776d170bfd8a

          SHA1

          cd964bce4b99fbb30b24257630b4fccbef52f11b

          SHA256

          ba6bcd9dc55af92c9da53d1325bd07228c16f2c045cf1ece712c3ab6180e9521

          SHA512

          cd072bb5fab10e030be5aa88e25ddd42f771a0d55d40d7dc24d82ccf83faaad11290ef1b168d0259afd8ec0189d0544c24edd3fa9899554e88202af4006e8d04

        • C:\Users\Admin\AppData\Local\Temp\zCom.resources

          Filesize

          62KB

          MD5

          aa4bdac8c4e0538ec2bb4b7574c94192

          SHA1

          ef76d834232b67b27ebd75708922adea97aeacce

          SHA256

          d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

          SHA512

          0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

        • memory/2044-0-0x0000000074B31000-0x0000000074B32000-memory.dmp

          Filesize

          4KB

        • memory/2044-2-0x0000000074B30000-0x00000000750DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2044-1-0x0000000074B30000-0x00000000750DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2044-24-0x0000000074B30000-0x00000000750DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2352-8-0x0000000074B30000-0x00000000750DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2352-18-0x0000000074B30000-0x00000000750DB000-memory.dmp

          Filesize

          5.7MB