Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 06:29

General

  • Target

    18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe

  • Size

    78KB

  • MD5

    d16017b7d0a1e11950044ca8b1dc2d80

  • SHA1

    5986f03370fee45de145fc787deb3dea52b9e571

  • SHA256

    18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bd

  • SHA512

    6e74a3f39fa9fdabb8ec40b3815eefbba514058d6ad0789277cc917931ad09b9f307249d4085f935a405e4b61194a669db97ad6eff0ad2da65d5b08dc890b735

  • SSDEEP

    1536:lRCHF3638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtRJ9/N1pU3:lRCHFq3Ln7N041QqhgRJ9/Jq

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe
    "C:\Users\Admin\AppData\Local\Temp\18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a_ndf3qk.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBFD5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc61D0C7F52DC46E1912418A2E99C720.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1012
    • C:\Users\Admin\AppData\Local\Temp\tmpBE3F.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpBE3F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\18f241caddc20dce3f80d64c1d2ae844d32eaecbba1ab17a8a8f1a2993e1d4bdN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESBFD5.tmp

    Filesize

    1KB

    MD5

    929a5347da8100e28ff115dd53ff286e

    SHA1

    b4ab0f78b9d1747235e81d7bd56bedd418c8d8c3

    SHA256

    9314734820e94092f34dc7b77a78691c76aea98f76531b9459d52c52c3b23931

    SHA512

    5973b14c281a3625b050a2fcca4a3fe2c421ff9d7c6d0e5ad014646528ff2d7030e712b5227ddf489f0180142da8753de903b5db33902bf28ab1291d549c7406

  • C:\Users\Admin\AppData\Local\Temp\a_ndf3qk.0.vb

    Filesize

    15KB

    MD5

    e093117f61d9a572688cdce6467ba8a0

    SHA1

    91eaeb818c018786c86ad41470f762e332f62e54

    SHA256

    bd9cc10f1c7f0020abe7094871fe348bfe8b6bb7b9604ef53f33c575bd3aff00

    SHA512

    5e1cab9623760388d676c22dddfda7bcea7244d32066c912630045eb3a623239125cb44d5df9ba3903a6fc1de40df0b7935fb53500dc243731cba4c5fb43a82c

  • C:\Users\Admin\AppData\Local\Temp\a_ndf3qk.cmdline

    Filesize

    266B

    MD5

    08f419c013cd6b29d0464c275239bada

    SHA1

    a11a4ee7d7dda12e68ca2f906c090ea0eb21ec40

    SHA256

    8ea07204534fd625e5b72688e29dffdb75f0e7f07e539beb0cfd38f975898fbc

    SHA512

    3a11a19ad30102036c12a0fb68174316713e81f742e8941f8be646d06764cbeea3c608db5fa6ca4f3b5c7b0c243fa98fb8abb0eb2c839212438ae597811cfec9

  • C:\Users\Admin\AppData\Local\Temp\tmpBE3F.tmp.exe

    Filesize

    78KB

    MD5

    c5c95ddd41a630fb70d70ef2cded9810

    SHA1

    c560387256968b1809a44400346e1fcb1c92fb94

    SHA256

    cdb0e0f50375c7105d07682020d1b5512612058bb1b67af8b61e393ea8543e44

    SHA512

    2418fc12c92fb4ae2de16e79e9ecc251a594c0b978eb0af3f5e6d2d98246237091461579e10c8a975f5e38eb521330055cdca1791d8e25d26615625ae9ba0535

  • C:\Users\Admin\AppData\Local\Temp\vbc61D0C7F52DC46E1912418A2E99C720.TMP

    Filesize

    660B

    MD5

    226b969eda670968a08e6b3bdbf62a6f

    SHA1

    fde6378d1d8d195b8199312aff33fc9a7c45198d

    SHA256

    a56afb01677549e3b5a0af38c936422a193ce317cef955a3c70547a0304e5490

    SHA512

    9a06646bb341bfc6144703d610d30d649a1e8dad22908d93d6a76d56f2ab34867125d89bad458081bb11eb7c91ccf2213cb5ea5f79e0ca284082f5a7f9c4432f

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/736-1-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/736-2-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/736-0-0x0000000074602000-0x0000000074603000-memory.dmp

    Filesize

    4KB

  • memory/736-22-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/1972-8-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/1972-18-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-24-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-23-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-26-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-27-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-28-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB