Resubmissions

17-01-2025 08:54

250117-kt5kmszjgv 10

17-01-2025 08:34

250117-kgmt3azlal 10

Analysis

  • max time kernel
    291s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 08:54

General

  • Target

    ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe

  • Size

    78KB

  • MD5

    74921ae1ff9ebcf44aad3fe2ce87acca

  • SHA1

    26283b9057972692c0121590b7d3621f114a4daa

  • SHA256

    ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d

  • SHA512

    8fc866e869f5adad91fda66e4f8779eb2cd0caf52085eccc8e358b40aadb3df54913fb05d0e6506ad12d768886f92afa85224ecc78c6c33c6e792adf7f53b3c6

  • SSDEEP

    1536:Qmy58QvZv0kH9gDDtWzYCnJPeoYrGQtC67Q9/o1x0w:vy58Ql0Y9MDYrm7jQ9/rw

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe
    "C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lsudmh9k.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBDC2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDCC4CB08F27D4F4B929FC9BBCA9371F0.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:464
    • C:\Users\Admin\AppData\Local\Temp\tmpBB8F.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpBB8F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESBDC2.tmp

    Filesize

    1KB

    MD5

    af3bee75ad21e9acfe3e9215323f4c31

    SHA1

    a704ea63e7e5ded571b36942f7135483ec18cdf8

    SHA256

    939e1a8481c9c965f2aa65bde86294cf973fcda799c8dab4f6e8811db0dfee4b

    SHA512

    f50b87572bbae52f3884205733049232e2ab38342b266a03093585f700d5de2234835035700c90ca3bed47d21903dda2260b713217fce36f9525103b53d2c576

  • C:\Users\Admin\AppData\Local\Temp\lsudmh9k.0.vb

    Filesize

    14KB

    MD5

    c3405c373bc24054d85245b9357237ce

    SHA1

    2eac3f55b590c03dd6ce85582062543199744f2c

    SHA256

    2d5237e97909ab0a2ce0892711199ffa2b9e241b6d2febd7a90b273a4641366c

    SHA512

    3d0d0d389252b4c3e6dcdb1c08b2977b21ca7235883b3fa16f3cbe3aeb4678463d2c0b7ba2cca0d02e516d4401238fd7e741ff9a7c8b6f7cef766e8e068aa57c

  • C:\Users\Admin\AppData\Local\Temp\lsudmh9k.cmdline

    Filesize

    266B

    MD5

    7a36b613372cf6f7cceed7634b3be8c6

    SHA1

    12e5950fb6520932c8f5b8be91488256d08cf1b0

    SHA256

    c382ea726c4dc43f6546de842ebbddabe93e06bd5b6c105f5ffd0bb1b3567be3

    SHA512

    3875fa3ca0429fd29a848bd7b0a106d9bb5ab736b7555c9323853f33f8c9b3712b0b282294255ad0b0ce2844411264d824223d43be026d55fdc0c7772e77f54f

  • C:\Users\Admin\AppData\Local\Temp\tmpBB8F.tmp.exe

    Filesize

    78KB

    MD5

    c64c103cc8b2e5e9616e9c37090d212c

    SHA1

    8ec7b5c4aed53a332e2599f5f443b4f6469a88de

    SHA256

    1a24abecbe0a2db81dc7417cb63aab331cff8db5c99456fd6e5fafe01e37ee80

    SHA512

    b681919c7a5c8b45d8a479e37334e11e0b3eb1505234cbd67fb86f8c0a3f2c7b05ad7b05e1600513b55b4d01ba288b277f05aaeacb9e59873c4d4ba1ccd2be70

  • C:\Users\Admin\AppData\Local\Temp\vbcDCC4CB08F27D4F4B929FC9BBCA9371F0.TMP

    Filesize

    660B

    MD5

    34cfa858fed839a07bbd5b062f0d07ac

    SHA1

    677a6cb294e8a7363c249454a77e6155d82bb2d4

    SHA256

    6bcc44e4cb6afb045460f584c6cce907a7ea2627f67b6c393e44f4b65e370fb8

    SHA512

    048ba0087e201c3214efe3e2992ee069c300f41b14023c46b8f5b3f46da1f8d3c5d2c81ce042d007d24a74edcfedce28d2eb3fb1b3d3ee8c94df9caf02e7f27c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/1060-22-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1060-28-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1060-27-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1060-26-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1060-24-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1168-23-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1168-1-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1168-2-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/1168-0-0x00000000752B2000-0x00000000752B3000-memory.dmp

    Filesize

    4KB

  • memory/3012-9-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB

  • memory/3012-18-0x00000000752B0000-0x0000000075861000-memory.dmp

    Filesize

    5.7MB