Analysis
-
max time kernel
107s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 18:58
Static task
static1
Behavioral task
behavioral1
Sample
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
Resource
win10v2004-20241007-en
General
-
Target
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
-
Size
78KB
-
MD5
a0644ba03ff17739ab64dac9d2af1130
-
SHA1
cc70c7053352b22f6f85460a96cf2cee20bf29f9
-
SHA256
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8
-
SHA512
130b816cfc1bc6a32db07fcab17186fae9fbb8d4aecaf26179365b2e720264a526f6f7a64b1956dcfd3934fff7423b32735a53668e9c9788b61c4a7ebe1f253a
-
SSDEEP
1536:lRCHY6M7t/vZv0kH9gDDtWzYCnJPeoYrGQteA9/y1ADc:lRCHYnh/l0Y9MDYrm7eA9/pc
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe -
Deletes itself 1 IoCs
pid Process 3676 tmp7FFD.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 3676 tmp7FFD.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmp7FFD.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7FFD.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3396 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe Token: SeDebugPrivilege 3676 tmp7FFD.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3396 wrote to memory of 3504 3396 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 83 PID 3396 wrote to memory of 3504 3396 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 83 PID 3396 wrote to memory of 3504 3396 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 83 PID 3504 wrote to memory of 1152 3504 vbc.exe 85 PID 3504 wrote to memory of 1152 3504 vbc.exe 85 PID 3504 wrote to memory of 1152 3504 vbc.exe 85 PID 3396 wrote to memory of 3676 3396 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 86 PID 3396 wrote to memory of 3676 3396 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 86 PID 3396 wrote to memory of 3676 3396 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe"C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yw4ltskk.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES826E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAC0EE47B4EEC496BA235FB172AFFA56.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7FFD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7FFD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580b859cb8dbaf8b022c4f58a56e1843c
SHA1a7ce49bffb45998c41d66dcb0d9bfae4c5325905
SHA25650e34c5295a27b300ac7d31f5aa51b6fadff859d4194a99431b7e883f9c898a1
SHA51272500c05bf24c270980c321cf1b6f299f7a322ae6d91f12f77329ce38669067ad66493983b63d009586874c37873ef51178e90d5dedca4f7941b049f9e2aed32
-
Filesize
78KB
MD53fb34a809a42733151e69aa1cef628ce
SHA14912f93b6ca62514743b4c56da7e054c8430aa60
SHA25693ced1ac0d6ca3dd0dcdea0ed1f0ff47f85f77b3754468e2d8118c89f0059671
SHA512e2b56a039e449dd81a86ca869c402b6a8c0e03c0844c76979c5b364b118476802effdd7182ca4ae2b269c347e7eee0fb27498455351a8e0e72d61780bbd4b50e
-
Filesize
660B
MD540b3f914b990ec97330da5adc8a2ae47
SHA16d78b3d581185097433bad389e2c753c23efe141
SHA256b0307812d47e03ba1afcf821a861adeea8ae15f0745d696932aacc8b88a2d0e0
SHA512a82541db6012e39a2b4793d9f75f0817f38bed4120a80adb03cf2cd86a95d8e1ca0e76cfd2b62539343eb7aae9cb30f53a422d8035420396f79f4e0403ae3a97
-
Filesize
15KB
MD5a07ea58cfa9193ceee631daffc6ea3b0
SHA196dc89bcb5d65706ab06502c11df6664c51b9f0e
SHA256f336b61246cc16638631bbe3c40792973626b2f21704094c096f9f69eec9ba7c
SHA512e6ff116eb816a08d1f01f7c768268be2e5a42889aa68d751f08f87fe519fc45a70e806894fdb12fa98d66733000adb16ad128280904755ee2180c22da9217a42
-
Filesize
266B
MD5972cb188ef880136ca75ae81c6bf6332
SHA10c6432c4c6669c5b70397235e1ac59712e1ab2f1
SHA256ff5987779eaf209d832394550f827fc37c158a23941cba6aade71cc39e9babab
SHA51222fc08de4e117f1737c3a7ec8fba263b4f3b3368a231505037620c1e8798936e41eced4ad4a6be9811fd0f6d52c35ba8a721f2ed71138f1d9b539935b57ae093
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d