Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 06:29
Static task
static1
Behavioral task
behavioral1
Sample
18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe
Resource
win10v2004-20241007-en
General
-
Target
18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe
-
Size
78KB
-
MD5
d16017b7d0a1e11950044ca8b1dc2d80
-
SHA1
5986f03370fee45de145fc787deb3dea52b9e571
-
SHA256
18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bd
-
SHA512
6e74a3f39fa9fdabb8ec40b3815eefbba514058d6ad0789277cc917931ad09b9f307249d4085f935a405e4b61194a669db97ad6eff0ad2da65d5b08dc890b735
-
SSDEEP
1536:lRCHF3638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtRJ9/N1pU3:lRCHFq3Ln7N041QqhgRJ9/Jq
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 tmpBE3F.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpBE3F.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpBE3F.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 736 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe Token: SeDebugPrivilege 4856 tmpBE3F.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 736 wrote to memory of 1972 736 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe 83 PID 736 wrote to memory of 1972 736 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe 83 PID 736 wrote to memory of 1972 736 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe 83 PID 1972 wrote to memory of 1012 1972 vbc.exe 85 PID 1972 wrote to memory of 1012 1972 vbc.exe 85 PID 1972 wrote to memory of 1012 1972 vbc.exe 85 PID 736 wrote to memory of 4856 736 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe 86 PID 736 wrote to memory of 4856 736 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe 86 PID 736 wrote to memory of 4856 736 18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe"C:\Users\Admin\AppData\Local\Temp\18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a_ndf3qk.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBFD5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc61D0C7F52DC46E1912418A2E99C720.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpBE3F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpBE3F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5929a5347da8100e28ff115dd53ff286e
SHA1b4ab0f78b9d1747235e81d7bd56bedd418c8d8c3
SHA2569314734820e94092f34dc7b77a78691c76aea98f76531b9459d52c52c3b23931
SHA5125973b14c281a3625b050a2fcca4a3fe2c421ff9d7c6d0e5ad014646528ff2d7030e712b5227ddf489f0180142da8753de903b5db33902bf28ab1291d549c7406
-
Filesize
15KB
MD5e093117f61d9a572688cdce6467ba8a0
SHA191eaeb818c018786c86ad41470f762e332f62e54
SHA256bd9cc10f1c7f0020abe7094871fe348bfe8b6bb7b9604ef53f33c575bd3aff00
SHA5125e1cab9623760388d676c22dddfda7bcea7244d32066c912630045eb3a623239125cb44d5df9ba3903a6fc1de40df0b7935fb53500dc243731cba4c5fb43a82c
-
Filesize
266B
MD508f419c013cd6b29d0464c275239bada
SHA1a11a4ee7d7dda12e68ca2f906c090ea0eb21ec40
SHA2568ea07204534fd625e5b72688e29dffdb75f0e7f07e539beb0cfd38f975898fbc
SHA5123a11a19ad30102036c12a0fb68174316713e81f742e8941f8be646d06764cbeea3c608db5fa6ca4f3b5c7b0c243fa98fb8abb0eb2c839212438ae597811cfec9
-
Filesize
78KB
MD5c5c95ddd41a630fb70d70ef2cded9810
SHA1c560387256968b1809a44400346e1fcb1c92fb94
SHA256cdb0e0f50375c7105d07682020d1b5512612058bb1b67af8b61e393ea8543e44
SHA5122418fc12c92fb4ae2de16e79e9ecc251a594c0b978eb0af3f5e6d2d98246237091461579e10c8a975f5e38eb521330055cdca1791d8e25d26615625ae9ba0535
-
Filesize
660B
MD5226b969eda670968a08e6b3bdbf62a6f
SHA1fde6378d1d8d195b8199312aff33fc9a7c45198d
SHA256a56afb01677549e3b5a0af38c936422a193ce317cef955a3c70547a0304e5490
SHA5129a06646bb341bfc6144703d610d30d649a1e8dad22908d93d6a76d56f2ab34867125d89bad458081bb11eb7c91ccf2213cb5ea5f79e0ca284082f5a7f9c4432f
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65