Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe
Resource
win10v2004-20241007-en
General
-
Target
78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe
-
Size
78KB
-
MD5
8f9c7a12d8590d6e45641f069629d9d0
-
SHA1
732eba194d82a5910ff956a40cd5924d8d3bd9c4
-
SHA256
78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290
-
SHA512
d923600ea137f94aee368de6d71f066f9dae6871b6e79e0150d496cbaadc37ab66fa584fc3e1c9e343955ab3e209b5b3df298857007821dda2b4a338cb722072
-
SSDEEP
1536:JRWV5jGXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6f9/gu1aa:JRWV5jOSyRxvhTzXPvCbW2Un9/T
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2996 tmp3B3C.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp3B3C.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp3B3C.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe Token: SeDebugPrivilege 2996 tmp3B3C.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2316 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 30 PID 2800 wrote to memory of 2316 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 30 PID 2800 wrote to memory of 2316 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 30 PID 2800 wrote to memory of 2316 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 30 PID 2316 wrote to memory of 1868 2316 vbc.exe 32 PID 2316 wrote to memory of 1868 2316 vbc.exe 32 PID 2316 wrote to memory of 1868 2316 vbc.exe 32 PID 2316 wrote to memory of 1868 2316 vbc.exe 32 PID 2800 wrote to memory of 2996 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 33 PID 2800 wrote to memory of 2996 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 33 PID 2800 wrote to memory of 2996 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 33 PID 2800 wrote to memory of 2996 2800 78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe"C:\Users\Admin\AppData\Local\Temp\78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ugphmxma.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C37.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3C36.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3B3C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3B3C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\78963414172a74120cc5d8c2edcbc581be607a36b83d87d07dd15061ff9a5290N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570c8a01b9551db335b5c0a04c1cd615b
SHA1f858703ccfc1fe01d5c1a9411465d20a578f29cb
SHA256345d00199e959d3fa05fe01ececa4b59812b983beb0e7066cc8482218a744f46
SHA512267a6c73a6546507bdec442c2872a16adcd7d3d03de89eda8f69a4cff9312a61088851ea376acbea80f5f406f4706ea27b2b95c7b5d9e79499fc69118afc029f
-
Filesize
78KB
MD594074a8358238d387f8b819619e1ca42
SHA141a370823ebf687446046243919bc563b1e566d0
SHA25693da93d0ba7c9ad554d174e099b7d851f175da3fb7623817e5917b84895b2a30
SHA512ef25b7be00e0bd37ac32df020991f9d8fae0c317cf40365671e1f7dff6e63a58c88243faa8ad659a84d8142138ff9dbde37c55cf9c2925ce30d2b70c7cd8b33d
-
Filesize
14KB
MD567c67de16bd06585bea69b82e58ae340
SHA14d3ff8d962f136650f138c01bfd966bd4cd97a92
SHA2566733737678d2b8bde90bd42b02e7f053887fe6856b80960716b0890e3dd8dbfd
SHA5125be8eca74479a9f250f1fa9b4dd76b295f8b40e3a1ae875d2317191fcdd59f1521251e5b12e764a77d8ee8f86936c58e9b7c234683f5f3766abec67b8c5e7884
-
Filesize
266B
MD5daf9b0b0268eb551cc26c95d7b596f46
SHA153032f0a34ecc327e3888728842ef1e0a440f398
SHA2568535ff60cb3ae4c9e3296eb5c67f8b33c52fdd1fb0a76a843b1ccbc57df1776f
SHA512abcd03a9fb3ae5acdcf521948fd9876d7fec989fe5f38d8e4d8855a840538cc5a7f778e88d1a91609a643a2793ca060d44a6472137f168b130338fcee9d127a3
-
Filesize
660B
MD512169fd303e11898b2acc67d9afd264d
SHA1a8893a1d026326109f987105d30538f761953be8
SHA256d671057a1bf37b183dddc5fe6c80fef3aa973df78a3e11e1c2921d52ade1cd75
SHA5127bc7eb5f4fb8531d5aa96c97706de8844a6d3b4bb8cacd1bc5e7d7fadc010e652131f70d26773f0791f4d32a2b6140d9fc33dcb0046ea2e8e9b7eb0144097422
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c