Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 21:17
Static task
static1
Behavioral task
behavioral1
Sample
46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe
Resource
win10v2004-20241007-en
General
-
Target
46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe
-
Size
78KB
-
MD5
3eade96ff4f99d2abb78de49abc6ebe0
-
SHA1
b36254d2f81c0d98e4ecc205cbe0e2e7c0a363bb
-
SHA256
46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863ee
-
SHA512
e94a7449302f37f6e2aab9747a10770306a999945c119bebd8dc2beaa87cb32df932c90251450693c18d8c463aca6253e59f0b400549aca9c96fd66a78d49c2c
-
SSDEEP
1536:BHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQteN9/01pP:BHFonhASyRxvhTzXPvCbW2UeN9/0
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2672 tmpE14A.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpE14A.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE14A.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe Token: SeDebugPrivilege 2672 tmpE14A.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2968 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 31 PID 1840 wrote to memory of 2968 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 31 PID 1840 wrote to memory of 2968 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 31 PID 1840 wrote to memory of 2968 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 31 PID 2968 wrote to memory of 2716 2968 vbc.exe 33 PID 2968 wrote to memory of 2716 2968 vbc.exe 33 PID 2968 wrote to memory of 2716 2968 vbc.exe 33 PID 2968 wrote to memory of 2716 2968 vbc.exe 33 PID 1840 wrote to memory of 2672 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 34 PID 1840 wrote to memory of 2672 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 34 PID 1840 wrote to memory of 2672 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 34 PID 1840 wrote to memory of 2672 1840 46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe"C:\Users\Admin\AppData\Local\Temp\46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\guu_ulzk.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE245.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE244.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpE14A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE14A.tmp.exe" C:\Users\Admin\AppData\Local\Temp\46f544419567b69302e1e49fb3c9a1d77e38d18706b255c448505829df0863eeN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eea106bb2d200ce7c26bd9f435b653de
SHA162eecb6e155d27a08ef7e6b89ba5f545288ad93d
SHA2566317162ba5a0a7bd1fe0babffde8c5129ae110dd5f1ae3d2eb01b95ab2d9845d
SHA512a42c399aa46faf61a55c955d3e0fd572bdde500ddb94386a837a21a4e629d9198c1f40a84d9b0aad52c87e77f16642ba7426cf95491a83ff3cbfec8547f748e9
-
Filesize
15KB
MD52293e82bd5044d3eed085d85daf2da94
SHA1b1b59d2a43e6cf2c680419d87654675acb261f9d
SHA2561e6a861373f92657ec971dbf3924edcc3a395055857c6283d5ebd4b9ca6e159f
SHA512766d8fad4d4d0009242de67ddbed17cfb30fd6b5d287528b9ea05620f10885c3726bf8e7a877edce23e792bcb60c111bcfd541d31b20b4d46ea3f3971a936577
-
Filesize
266B
MD50280317d04da49c42dfeb1ddf60b53b5
SHA166c258efb583688533bdd58f3eb1e5873dfb17b9
SHA25673a65c068defa5f7d62e70747bed7aa878cde09c79b2b9c7f99296fdf174fabb
SHA51246954c353bd3fc1c9f291ae300eadec2017324b69af5a454855e02cb79ef6ccc433d15367be082008331b4bc06103cc99e129916a609b492b36b2fa012bce05e
-
Filesize
78KB
MD544604f5c847726481561d92a59540f74
SHA1f5f558f17b0c86ce95d7b36542d1d2430f8ca5b5
SHA2566fd0bba099d04de8e914c4abe70edfbc4f7811d03c730782cde4955a4837634f
SHA512ad4c016ac05b5717e6cc67bd205da9abd7226b1b1e3a4875a13ddd00a5fbb8d9efbebbbd1a6b9f6f080ba11af9cd135439d730b89701a2e51fa47c5284d8bf9f
-
Filesize
660B
MD586d7999c91836586c5a34bdd035dcda1
SHA1f322ebde19a1bbd02df066c317a9d7b7fe88e4de
SHA25614fa7ed653616e64ecc0087fea72b25946bc15562f1f84d69497de7db9d93bcc
SHA512329fde51e0903a375118b2b5d953583b4fcba19d6c28f162a77b725e3df766fc087c2a6700d4f9cb3a198e0c11dfa3ebc3f8e9fd1cdb5a2a0a93706c8e0462d7
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c