Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2025, 03:14

General

  • Target

    bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe

  • Size

    78KB

  • MD5

    3bca59494733119c7da105bcf6926a90

  • SHA1

    144dba8062069502fe3700802f752a4a7a4cd28e

  • SHA256

    bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0

  • SHA512

    5e7a454a7619a176bc7f08e952053270af392db32d36225c136a5a960c31d9c22f9919495daa607323fba1825e71e407c01dd08b08d9a528616cf48d89a44418

  • SSDEEP

    1536:fCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQti9/N1Ag:fCHF8hASyRxvhTzXPvCbW2Ui9/F

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p8kx5ie9.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD875.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD874.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1560
    • C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe" C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2212

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RESD875.tmp

          Filesize

          1KB

          MD5

          4daa6eeb107f00ecab888c5b5a76e336

          SHA1

          8a8868d4b94430155e887592729a0449946bf414

          SHA256

          535f920fefe4c91596bef6b3b33098163a747e8ec17e2fd528813b8387de6d94

          SHA512

          90e0116fc7fe619d29bf9f67543a072f01c40bc7570db2f7b2e4c7a64775de25a7bee99ff4f0ed58225810620f1aaae4df615facf5a0f53e673c1edb14900d26

        • C:\Users\Admin\AppData\Local\Temp\p8kx5ie9.0.vb

          Filesize

          15KB

          MD5

          e9230a02ff40aa3dbfa51abece2f6833

          SHA1

          91003a29613f996234c775fc713030ac2ad0262b

          SHA256

          6ffd70b298039fb343f362c2aeceee4ef21e69bfaabc2c601f49b60425caa931

          SHA512

          d96cf536ba9140619c6aa965afdca128ef93d5a3369cccdefd4573de102fac7bb19e117708decd9245e5ff0411145fdbdb4d9dfbef09981edb95ec80e4c32220

        • C:\Users\Admin\AppData\Local\Temp\p8kx5ie9.cmdline

          Filesize

          266B

          MD5

          9754cb4c6dd5b78ef4f0355803ea30f8

          SHA1

          7d95afc429db8616aab052fd4aa21dbb20988fb8

          SHA256

          3b47fa3980b04cab47098f5caf791e3bf6cae3fccf9eff0f34e70f9412f94116

          SHA512

          7addbb75d85b23fbaa8dcc1e402571a88cc86524de789c897963f3443ce3d517ca83c9a7fae1f52ca7a3f7f943a98856a0562f56df9a81caa33637e45c2d7e09

        • C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe

          Filesize

          78KB

          MD5

          13387287582eac0374c0c7d4b7cfc9d0

          SHA1

          5eb27b96c70c67f5c04ea6fec7097738f79173f1

          SHA256

          0888c0cf29c330bcac135a63d963348bfcf6ffcba149ff8566266985d46095f2

          SHA512

          05d6e57a49528b85b41a3a460e6300355b34e4ff33bc5c858646ad514a04066653a1685c41c753132419b3588709d402adf0b7de6e7932c3fc61d9a33048153e

        • C:\Users\Admin\AppData\Local\Temp\vbcD874.tmp

          Filesize

          660B

          MD5

          b4de81e6b45e612a87e1f29875aeefcc

          SHA1

          4af22ebe63b749cdbb9a7b9542fd5d7faa4243be

          SHA256

          3c11129d4776325496cbc2731de5e886d7745cb1115250fb5c0c0a28dc2283fb

          SHA512

          2933b22bd201a9a1a014b8b1d44f85ede7ae18d3ad5f936a60cec56209e7de5b19f7438a3d8cf42cbb8914f55d5337a0e127c7e5c29a497aaa526f9c4e700979

        • C:\Users\Admin\AppData\Local\Temp\zCom.resources

          Filesize

          62KB

          MD5

          8fd8e054ba10661e530e54511658ac20

          SHA1

          72911622012ddf68f95c1e1424894ecb4442e6fd

          SHA256

          822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

          SHA512

          c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

        • memory/2288-8-0x0000000074120000-0x00000000746CB000-memory.dmp

          Filesize

          5.7MB

        • memory/2288-18-0x0000000074120000-0x00000000746CB000-memory.dmp

          Filesize

          5.7MB

        • memory/2324-0-0x0000000074121000-0x0000000074122000-memory.dmp

          Filesize

          4KB

        • memory/2324-1-0x0000000074120000-0x00000000746CB000-memory.dmp

          Filesize

          5.7MB

        • memory/2324-2-0x0000000074120000-0x00000000746CB000-memory.dmp

          Filesize

          5.7MB

        • memory/2324-24-0x0000000074120000-0x00000000746CB000-memory.dmp

          Filesize

          5.7MB