Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 04:09
Static task
static1
Behavioral task
behavioral1
Sample
a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe
Resource
win10v2004-20241007-en
General
-
Target
a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe
-
Size
78KB
-
MD5
9ee285e637d3f244761aeeb8b8a0bb3a
-
SHA1
61918970a93189084da0f0cf97b918b4bb8f6d8c
-
SHA256
a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f
-
SHA512
0ccced9efa8b52c984ba907365d31821c35e90b0f090eb22808366edb54c77cf5775996432e3fd9a2ecebbd9234b219dce1497bcc446f4af09f19e3dce1e7a19
-
SSDEEP
1536:quHFo6M7t/vZv0kH9gDDtWzYCnJPeoYrGQtR99/011x:quHFonh/l0Y9MDYrm7R99/q
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2900 tmp4F58.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmp4F58.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp4F58.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe Token: SeDebugPrivilege 2900 tmp4F58.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2736 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 30 PID 2432 wrote to memory of 2736 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 30 PID 2432 wrote to memory of 2736 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 30 PID 2432 wrote to memory of 2736 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 30 PID 2736 wrote to memory of 2676 2736 vbc.exe 32 PID 2736 wrote to memory of 2676 2736 vbc.exe 32 PID 2736 wrote to memory of 2676 2736 vbc.exe 32 PID 2736 wrote to memory of 2676 2736 vbc.exe 32 PID 2432 wrote to memory of 2900 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 33 PID 2432 wrote to memory of 2900 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 33 PID 2432 wrote to memory of 2900 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 33 PID 2432 wrote to memory of 2900 2432 a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe"C:\Users\Admin\AppData\Local\Temp\a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vq3sdtao.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES50A1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc50A0.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4F58.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4F58.tmp.exe" C:\Users\Admin\AppData\Local\Temp\a080d4f91459f4d247290bc0403bf22b372b2fbdc621b0b45808c92b118ad09f.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD545c53a7460dbdd75f6726429443dcfa5
SHA1386bcac832024aac361f713adb3d9cae0266ea7c
SHA256511b58aaed9203a3e361f5e10dec7658d98c498e9827458753f929238cb6454e
SHA51237c8f7578c4a164f2025ac8570338f8c49be2d1b56d9e646200bc52f15353f6dd117efd40c447035f9368462be1e2dcd96f0aea053bb82ca955a680d33e7f124
-
Filesize
78KB
MD5aadd224958e4ab7e70fcaa0c60ba2b03
SHA10251cb62fbb1a45663e8d6f93f225f0f75b1ac56
SHA256d3d408299d43427503c745d132dfd2e67119483627256b6e286739fb7e2273fd
SHA512808e547e92903167070c687c998cd1c1bce9ed1dd9426e9051bb9e8b541cc6a55f59597b4b03295477213c85db158bf0e6b18e871c3b42fe172a1db134dc83a5
-
Filesize
660B
MD5e1c802d65f0eb8bcbfc2969e29c3d517
SHA1eaaca189e0bc592239587b466614ee144e802970
SHA25621f72dc998ada4e2973a57c0593232245ebbbbd8ed15d9908711ee682401f20d
SHA512c8e729658ba35cbf7be306dbd5292ed5aaf2f169b662d6c7ae1dbf5ecc782c8b6dcf9f50a8d56ec135b3c01cc26297b4b4cfabe2958d4abd39f7ca518109b81b
-
Filesize
15KB
MD5e214a872aebdf3a283e7186755f13819
SHA1cf6f6aadc0a1d4dd1ab3c4c8708ca7365fb6338d
SHA256f0564b922a8dc415b57de6f9d9b501bebc640b6c3e38976f5a33c1926d050361
SHA5124315325637323be73b110d9686a50039266f5aa0c378389f0d146475c21e7ff7e2df36cf168d6516aad605ca12b454e47c41219188c8017e245696d931ba89d2
-
Filesize
266B
MD52f97e62177917ab20cf22eab233260ab
SHA18154262d966204d0df1c62987f03abe1e1feed4e
SHA2565195bf5e4ae147b7cfd89eb736751df5574fe6b0abcfb695fc65a1d0dccf68a0
SHA512c350292b26e4b893098eaa48a95cfa6f522528eaa97e4c738b70592e81f092f2e4e9f2ab22d6f45e2e6743d94ac2c79fb0cfaace9c225869cc6803a2f661b8d9
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d