Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 08:02

General

  • Target

    e6d918158a2e4ae801fab31c3372829b85f3b52e68bfc8017d9c3b880b84845e.exe

  • Size

    78KB

  • MD5

    6c5ba3841c33f959898afe862fb00e32

  • SHA1

    8923ca1d9dfba6fc985ce8d5200ed00de57a0da3

  • SHA256

    e6d918158a2e4ae801fab31c3372829b85f3b52e68bfc8017d9c3b880b84845e

  • SHA512

    2d37960bfeb868cd30c9a76d8c39aa36b1fd45c08f00dcac224373f47f36240881502c17ab5a31948887f65f9a82493324dc37116076afb7a62e125d4792a79d

  • SSDEEP

    1536:QRWtHHM7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtRP9/k11qc:QRWtHshASyRxvhTzXPvCbW2URP9/Nc

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6d918158a2e4ae801fab31c3372829b85f3b52e68bfc8017d9c3b880b84845e.exe
    "C:\Users\Admin\AppData\Local\Temp\e6d918158a2e4ae801fab31c3372829b85f3b52e68bfc8017d9c3b880b84845e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bojnmyla.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAFE7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc40637F7880AD4666B6BB5EAA2CBF7FA9.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4888
    • C:\Users\Admin\AppData\Local\Temp\tmpADA5.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpADA5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e6d918158a2e4ae801fab31c3372829b85f3b52e68bfc8017d9c3b880b84845e.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESAFE7.tmp

    Filesize

    1KB

    MD5

    c78897f18956c2e482b19c7140d71eb6

    SHA1

    8090627a9bfa14b2aa2198ed7e1659d902414530

    SHA256

    c14d73820811c98eb4201ade2ed265a6fcd30cb8abdd4f8fafd88cda28a54c9d

    SHA512

    edbfeeaefeedfe79333ccf709c209b63d5ad1fa9edc2adeb0e9f0634d9dd1fde94d440499b92f79d1e6b5b3c5c31e0c148e94272495aff26ee5b00907fb6f631

  • C:\Users\Admin\AppData\Local\Temp\bojnmyla.0.vb

    Filesize

    15KB

    MD5

    e6ca7bb13a5221e5013b1f7e3b33bac6

    SHA1

    03bd5cc143208b0369aa76585dea8d52f80c2e07

    SHA256

    d68542b566688fdb06cec61d7bacdc13b12437a5f7807a773783036124d4df9b

    SHA512

    8bac38c9902407792f95f9224de51360646840db487f79e9aa156363a6c59e3ee7f50a98f68b209d9fc842b8bf69c8a6e145901303167c03b391201b06c1f987

  • C:\Users\Admin\AppData\Local\Temp\bojnmyla.cmdline

    Filesize

    266B

    MD5

    ab44dd3a7b20c61834d9e0c468b3df87

    SHA1

    09eec612f24aaad387da6fbc0ecdc1ee2a089db2

    SHA256

    2a5dfc025e73b3dc713a3dfa899f7502eb86467f8c05eb5548dbd005c3466df9

    SHA512

    7d8bb43d646c11916379f1a5571042e33f8bfd82e34b8274312ce3d764582e00f6450ec5471024200a7f840016d6ff40d768a4ae4d7b6b2f83dabb9f8a77b9fd

  • C:\Users\Admin\AppData\Local\Temp\tmpADA5.tmp.exe

    Filesize

    78KB

    MD5

    c62e410c416c10d85895291062888abb

    SHA1

    dd5cf0c352b4b4e0105813c35950d0b5346e78f3

    SHA256

    f4301875f91447c1a0523089461598c97862ad2ea2795d5e881062fa9e33fe42

    SHA512

    cc1ae8d97f9d2e41c67577856cbcb4dc980e883a3bc922980fb5ad5ff543f641027f4caa2bb1501b928b19180573d8d58dd1b851c63060ff98bb8b54534d45f7

  • C:\Users\Admin\AppData\Local\Temp\vbc40637F7880AD4666B6BB5EAA2CBF7FA9.TMP

    Filesize

    660B

    MD5

    21b76e0b3a4200dcce623f4e1f163f35

    SHA1

    e7684a94e4e380af842f22e045134724383e0c3f

    SHA256

    bea5cbb33d3b7807458ba7d2a9a8a6915b1ceb4e8412507f804a7751195312ff

    SHA512

    1312a28db541a7589147714eeb195481d1c21df75e986e3bf96757eb7bc67290ac190c2aa32c7854b97b3c80a0fb8d1168776efd4ab6215df3e460718bf43296

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2160-24-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-23-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-25-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-27-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-28-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-29-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-18-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-9-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/4864-0-0x0000000074B12000-0x0000000074B13000-memory.dmp

    Filesize

    4KB

  • memory/4864-22-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/4864-1-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/4864-2-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB