Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 21:14

General

  • Target

    1d2e0833776f95677f9fd242ca134693877762efd11e801f03030c506e4fde19.exe

  • Size

    78KB

  • MD5

    0c541636c90447f84b405665a7cbe1cf

  • SHA1

    158060e809d81ec5157c0046d1ffbe49d831fef2

  • SHA256

    1d2e0833776f95677f9fd242ca134693877762efd11e801f03030c506e4fde19

  • SHA512

    4c7f7950905160646a35c41f1b61e8f7176da98f9b8eb98eef09bb4bbac7ff3dae0ad68246a3c8a8260f9216de102de091ad81478096de99213b7830815b2688

  • SSDEEP

    1536:+c585XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQt96r9/lpL1Gh:+c58pSyRxvhTzXPvCbW2Uk9//s

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d2e0833776f95677f9fd242ca134693877762efd11e801f03030c506e4fde19.exe
    "C:\Users\Admin\AppData\Local\Temp\1d2e0833776f95677f9fd242ca134693877762efd11e801f03030c506e4fde19.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3gxmwcuu.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7ED5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE70A55270EE4D0CB28DBC377DACB11A.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2132
    • C:\Users\Admin\AppData\Local\Temp\tmp7D7D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp7D7D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\1d2e0833776f95677f9fd242ca134693877762efd11e801f03030c506e4fde19.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3gxmwcuu.0.vb

    Filesize

    14KB

    MD5

    30dfff1d46451cf4cd953a570d3d5d8c

    SHA1

    cd2c4358f0d31deb0c4ccdc6b0165faf14004716

    SHA256

    b9dea4f7a45794c8c36f754c0fb6789ef2c2cdc637bf4bb119641d9e2b2be1e9

    SHA512

    d8920aed44bb6ca4d23f922ce1631facd3a209b2c9e10de78938e27df0fa61d175c9c6fba1a78c39661c5e48613b28bbf47e4edd834a7629d53f94d40612f40b

  • C:\Users\Admin\AppData\Local\Temp\3gxmwcuu.cmdline

    Filesize

    266B

    MD5

    2358e877fd1d77123b6e361d5d08f5b8

    SHA1

    e53bab49dd75efa56b22bb2b0fd5eaa8438116a6

    SHA256

    a353aef02b93412f2860dd5cde6d92c9beefef7e828a9621e479b787391e870b

    SHA512

    fb6ef1cfc3f225adfcde380a812085f1f60cea0ad042749a61bc19a1787da51ebcef88e5297b0f87fdbec930cfde0d96aa7fb812e33db18513fb24a5acd2310e

  • C:\Users\Admin\AppData\Local\Temp\RES7ED5.tmp

    Filesize

    1KB

    MD5

    4c10d58e23ac996a12e66dac5218e4b3

    SHA1

    455ee60a4fd0066a46c58cdbf6765ada5a257d9a

    SHA256

    2501c54b5dc8bf69e3e9713659a59e6c79881a8d701efecbf2933a8c9bcdb410

    SHA512

    b1511ee24cf747eb16352b8b4fed02925109832a2eac0855e4968d365ea79bad16826877257b713783f0f5f7e0727cd361303cfc96b9506d5332d8fe42cfb0c6

  • C:\Users\Admin\AppData\Local\Temp\tmp7D7D.tmp.exe

    Filesize

    78KB

    MD5

    03075f5498193f99172d1d7c8d5069e6

    SHA1

    564c99ae33ea0118b39c10e12f7efb1dd44cd2c0

    SHA256

    780b028237e6f4bcad90d1230ca34195e668da12e5ecde248587cf4c2ce50f02

    SHA512

    cf7e852e1e1eaee1754f8146356a3402b24c2543221a4f0fafc8514d293c4565a74bff1cd7fa9c2c0a048a49e12ae6bc6af7e34d8926c04f5fac2d9f44ac4b99

  • C:\Users\Admin\AppData\Local\Temp\vbcE70A55270EE4D0CB28DBC377DACB11A.TMP

    Filesize

    660B

    MD5

    ecf2284ef12f3ccbc3536a1e22846a2f

    SHA1

    c7a40ca29cb08bb8e7d366897b5b32d9cf6f477d

    SHA256

    1dd38a992fd2e173bb757edf73a6d56fe218693fff2a09636ec7d52f6e4289e6

    SHA512

    53b52ab8e5bdeae9e019940de0ce8ea4878e7e72799b4a3c1edc6604b3265050807cea0efccd9b44d4853b583edf8bdadb6f9656919090670535eb93bd57f015

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2592-18-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/2592-9-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/3156-23-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/3156-24-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/3156-26-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/3156-27-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/3156-28-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/4524-0-0x0000000075592000-0x0000000075593000-memory.dmp

    Filesize

    4KB

  • memory/4524-2-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/4524-1-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB

  • memory/4524-22-0x0000000075590000-0x0000000075B41000-memory.dmp

    Filesize

    5.7MB