Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 03:30

General

  • Target

    b852656fc617777c2f947d09669de7612deccd1dd416a9e30840f7c0fd135bf0.exe

  • Size

    78KB

  • MD5

    b6b118ffda8341066fd5ba634a822777

  • SHA1

    f6fc611f438f43081ed8cd0eb4ccf0936497227e

  • SHA256

    b852656fc617777c2f947d09669de7612deccd1dd416a9e30840f7c0fd135bf0

  • SHA512

    8b6d48f81cc1011b52b8c9c4cfea16883143651e09e4725111d8fb92c78536b328c78ad57c2a987b20c42978ac55fefd01dc391cd550236c32164dae67a0cfca

  • SSDEEP

    1536:4V5jSSXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6b9/Gy1hd:4V5jSKSyRxvhTzXPvCbW2UT9/9

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b852656fc617777c2f947d09669de7612deccd1dd416a9e30840f7c0fd135bf0.exe
    "C:\Users\Admin\AppData\Local\Temp\b852656fc617777c2f947d09669de7612deccd1dd416a9e30840f7c0fd135bf0.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wgxul2z1.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8FAD.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc542A51625A5B4256BDA1C770D5B5573.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5052
    • C:\Users\Admin\AppData\Local\Temp\tmp8EF2.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp8EF2.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b852656fc617777c2f947d09669de7612deccd1dd416a9e30840f7c0fd135bf0.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8FAD.tmp

    Filesize

    1KB

    MD5

    5af85ec17b657d1cffb078492406d498

    SHA1

    cd963302ff8a5dd21ae45039189bded40d947447

    SHA256

    01a9f887410645e80f32669bc1838df12ffd565e802de4f6501dbd940e2bbe85

    SHA512

    b7245684b08a68c3e3a8147e8315c344ff8a03ca3de09c00e234dc8a1047395f401184d4dd6477f7c22f4c6a7e04a885181296fe582ed8de6c451edd4d05fcce

  • C:\Users\Admin\AppData\Local\Temp\tmp8EF2.tmp.exe

    Filesize

    78KB

    MD5

    97e41f913d3471e336c36160d8923fe0

    SHA1

    63bd96eb73e44ef672dfb75d14728a0022d98a03

    SHA256

    04317e09e94543cf7889c5d2274bdedd649032cb15bb410ec90f706024c283c0

    SHA512

    770ae5c34fa6d02cdc0c3652421c0207b43f3f71c0a38060233edbf95a66bbaebf91f8f366422d2f405705c155525ce8fdf81412b608401cddce05da9b764f9f

  • C:\Users\Admin\AppData\Local\Temp\vbc542A51625A5B4256BDA1C770D5B5573.TMP

    Filesize

    660B

    MD5

    d315942d6416a400e4f7dc74354c324b

    SHA1

    184502d0b266857badf299443bf10e6902e006cb

    SHA256

    79c7699349ec504d09ce789d2bbb17947ac67dc2536c9be5af1b2ab41e5fa04e

    SHA512

    01c8788c02ed6018f74ff57b48758c1760bac0af2291b80326ecbcf85205cece4c7c3721c079722d421e1c475f22aeabe4c74d411694ac0d6a3efaf6ce4569e4

  • C:\Users\Admin\AppData\Local\Temp\wgxul2z1.0.vb

    Filesize

    14KB

    MD5

    8e9ca0d7720e4fe1b5a0206b55e064db

    SHA1

    0c728f172ad6c7c6814601464c8a03667d06d518

    SHA256

    57b8d6ecce9832277ae040198fe50082ed0aa1a8669f3356bd8f442efbeb5037

    SHA512

    cbaed5a66a103bcf911626feb955021a7a983b3c2a8a6cc5f2cddaaee18e753bf4cdabec13dfff2c56c22b046b720becadd5f91ae1bc6cefa8ec607cbc0a9a5c

  • C:\Users\Admin\AppData\Local\Temp\wgxul2z1.cmdline

    Filesize

    266B

    MD5

    07b1b9e7f7b271409a26298bed1b62aa

    SHA1

    f796d003d943b2598b33e30797fc75978248c643

    SHA256

    b501d00e256a08f288010526157d3544186ba699b4239485eb6805a6b3f28f89

    SHA512

    5d4f48b0f059a59c65b9908bd25c2c34ec4e981ae910ea06aed0207cfbb356f9d481f098d90af910bd1a586e1c9b9806184b47aabb349d29322d8c5d9fb6cfe2

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/708-1-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/708-2-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/708-0-0x0000000075202000-0x0000000075203000-memory.dmp

    Filesize

    4KB

  • memory/708-22-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/1916-8-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/1916-18-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-23-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-25-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-24-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-27-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-28-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3420-29-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB