Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 17:23
Static task
static1
Behavioral task
behavioral1
Sample
cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe
Resource
win10v2004-20241007-en
General
-
Target
cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe
-
Size
78KB
-
MD5
794f6ac4345e8e89b7dee7276654a190
-
SHA1
ffd2a50541d35461d2f4e0ae7d6964a9e77fd20b
-
SHA256
cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842
-
SHA512
a8f42f271cce26aa7d5918d89cb22e95ed267fa26076068a87f59b36ef4e3f4a1a5c8fdf7ec42771e7d3c1895b9c6c67e3e14a1b007d33b1a8b3d6fa0e5b58e2
-
SSDEEP
1536:vWV5jSJXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtN609/Bs1T/:vWV5jS5SyRxvY3md+dWWZyf9/w
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe -
Deletes itself 1 IoCs
pid Process 1120 tmpBC1C.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 1120 tmpBC1C.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmpBC1C.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpBC1C.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3136 cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe Token: SeDebugPrivilege 1120 tmpBC1C.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4716 3136 cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe 84 PID 3136 wrote to memory of 4716 3136 cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe 84 PID 3136 wrote to memory of 4716 3136 cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe 84 PID 4716 wrote to memory of 2220 4716 vbc.exe 86 PID 4716 wrote to memory of 2220 4716 vbc.exe 86 PID 4716 wrote to memory of 2220 4716 vbc.exe 86 PID 3136 wrote to memory of 1120 3136 cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe 87 PID 3136 wrote to memory of 1120 3136 cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe 87 PID 3136 wrote to memory of 1120 3136 cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe"C:\Users\Admin\AppData\Local\Temp\cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\niuetq4w.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBDD2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc614B21A2E8E04E9A872BED1F4955136.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpBC1C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpBC1C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\cb9aa29fc2138de807891b529a07ce61d2ec32ec63176b463fed5425af5bf842N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5565ed949e752f583ebbf4e527428dbed
SHA1f0d0da311a361bbf8616ecdc53bf200fe9cf5c29
SHA25671ff2317725bf6bcc4b2a8a07fede29e7c25391803550f85c78271462f05bc0c
SHA5128612f6bcd686ce27c5480667427969bf36fb4408f3c283db0b0e6873e8f0094ae16630c5d6f0dcec4a7e3819ea007e4060bdbf4dd565757959c952d368b2813a
-
Filesize
14KB
MD5806e3885d02a4a4d16e2b4bcee21c8c3
SHA13727936be1876370802b7e25df202be05552cdfa
SHA256ac1d0737ba09eb74043378995223d71c3e4d3d678a76601a1cf6d4c8a949e182
SHA5122e9f2656809ada9b0b7ca93521d351f68f7bfe0b21b4731e69b69c768ef397fc9124b64752b82a6ca865d36dc222c061e4ab8c4eecb7ead9042ec9a699274a0e
-
Filesize
266B
MD5686e6069d0a25e4f932ae24d39f1988a
SHA1de69e641286c27cfb07e090ad29c572ada0c0a6f
SHA256e9d8b02d54e90521c154c8da5d8212d8d09da9a78be37cc75785113c80faa919
SHA512f815829f66d552b12905f286590a45889b3eef2b08051b96486084a38f6a21b1acbd687131b626e15d3191dae394755f85dc203612c9971ead0bd4579199d138
-
Filesize
78KB
MD5fd00213a69126ff2580eb2d9e09bdfd1
SHA1314d5a66e03bffa0f1247874b120f2422e44f1a1
SHA256fce96b8ea687fd8b99f784787f58ec2fe785a0251e15fb1ae6cabe30c85ddea2
SHA5121b0b33d11d28f4e47f985e2d55d41e9bfcb8f35741927525d9656e42ce300905c175e57d9216c39d043b9c0c0d4055a8be7d48ba20efa76c8ccc90e184e58f0f
-
Filesize
660B
MD58755e898782363bce7dfdbf3873aefd3
SHA1d67b328b8faeeffd7e0d0182c8d2e806e4707fbc
SHA256f697d2acdfb0948a8b3d7fa3de006d54f4b501ad4187cb791fe42fe5a96aef1a
SHA512f2e8678b2fec6585e96efcf88398d4c0bf6f014502c406dfdd47af1410d08dcf49a0fc3a1430c323c2607de91a53229ff401b088b43f84213e73b072da6296c1
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107