Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 22:56

General

  • Target

    61c02081dac3602ce3b073298aff8c74724d8745d04b068eda6e136598f1d659.exe

  • Size

    78KB

  • MD5

    e4897a8be1034d542242980607e943bf

  • SHA1

    e36b731bcce9b5a998c5f6977171b53941eb4441

  • SHA256

    61c02081dac3602ce3b073298aff8c74724d8745d04b068eda6e136598f1d659

  • SHA512

    5d0fed165da8812f4c6320591826bcffd5120c83bec0e4e3e9c8905b5c3f171e20b1ba15af83493e5774e65cb2fff6f555da89f6ee9728683cd90d0186350933

  • SSDEEP

    1536:lWV58BXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6G9/kD1u5:lWV58BSyRxvhTzXPvCbW2UO9/N

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61c02081dac3602ce3b073298aff8c74724d8745d04b068eda6e136598f1d659.exe
    "C:\Users\Admin\AppData\Local\Temp\61c02081dac3602ce3b073298aff8c74724d8745d04b068eda6e136598f1d659.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\owqqjlhr.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA6DB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA6DA.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1964
    • C:\Users\Admin\AppData\Local\Temp\tmpA554.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA554.tmp.exe" C:\Users\Admin\AppData\Local\Temp\61c02081dac3602ce3b073298aff8c74724d8745d04b068eda6e136598f1d659.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA6DB.tmp

    Filesize

    1KB

    MD5

    8c5501d3fe53a11d5bf50303c5891355

    SHA1

    6c38c57b9f18640587a91b70fe6f0582f4d2d3ea

    SHA256

    99f64a367479587f4bed2a6c2fa0598eaf154017c3ba55f494cc0dede7339c49

    SHA512

    300c3481bd102a394e5059f6c4afb99fefe150ef200b638e38abbc9c0b653771ad681f5747c002719daa7d94c0ccf7be1800beb4e98bd586e29f8e82ec430d62

  • C:\Users\Admin\AppData\Local\Temp\owqqjlhr.0.vb

    Filesize

    14KB

    MD5

    8d3f70e81d799826f1973599f63f3002

    SHA1

    7db4ca96cbe5f84eb827259c86efdf46261ce594

    SHA256

    69cf8df5ec5bd539ae503cb4e39a0fb1588689d309b9aeed21b71b71771f1569

    SHA512

    3d30a80a5a1a50f3342b95925f96f27c19f6b97941daf207c8dda588f2bfc21d00d4f7d89f629c5ad134dc7c3a8b0e8365dcdf3ab4a434b2a448d289e8f856be

  • C:\Users\Admin\AppData\Local\Temp\owqqjlhr.cmdline

    Filesize

    266B

    MD5

    fe4e5caaf6061d359c800c775a1e3db2

    SHA1

    aad02d9e86ba5486dd5c1cc8994026d3f49e7d4c

    SHA256

    a65ff1e44f13d3bacf4914ee4bc527c940e3014715347c09dba7df205393570a

    SHA512

    92a7b317860fc12fe200683f98acc63fe5c45eb3c47aaaaf3299f4409a0632b140ab97c675e67514a778ed52f3292ea85ecfe784f14880c25039f5d8e5436d88

  • C:\Users\Admin\AppData\Local\Temp\tmpA554.tmp.exe

    Filesize

    78KB

    MD5

    6df3f05b9378387ea6b4befe01441c9e

    SHA1

    7bc519b1c995683a5b2e941ad0de3928ec1ec383

    SHA256

    b648ead328ec0b6072464a948b1c023409206f38e51c3299d62b811ee0a8fdf2

    SHA512

    53e23f617dc3dd48663491d886398d2905a780d0e3d026ad33ebaebe58720980629d9e4626f2b637c09a5ee984c6154fe02f9d7bcbd0461b7fc497b04056b370

  • C:\Users\Admin\AppData\Local\Temp\vbcA6DA.tmp

    Filesize

    660B

    MD5

    ce20b1a188f0613204b7a65dadb3f060

    SHA1

    75eb80607f7b683a3750d6a7bf120a8b74d7a84d

    SHA256

    8d1e03c9554380073148289a2a4aa06b8e0e6dbbd1d5033f1aa2d5e571e9a95a

    SHA512

    5cf630fd887dd5c3e1749a761bcb803ac724619066d189cee60706b4d2eecacabbc20c186e71a2fd6376b9d3a7fd45288d0ad3f2f83284a991e1c87a5f394a44

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1992-0-0x0000000074191000-0x0000000074192000-memory.dmp

    Filesize

    4KB

  • memory/1992-2-0x0000000074190000-0x000000007473B000-memory.dmp

    Filesize

    5.7MB

  • memory/1992-1-0x0000000074190000-0x000000007473B000-memory.dmp

    Filesize

    5.7MB

  • memory/1992-23-0x0000000074190000-0x000000007473B000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-8-0x0000000074190000-0x000000007473B000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-18-0x0000000074190000-0x000000007473B000-memory.dmp

    Filesize

    5.7MB