Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 01:59

General

  • Target

    90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe

  • Size

    78KB

  • MD5

    7398657f6e29412c7b7b60fadd719f11

  • SHA1

    615e1d808eecfc48cafc46645f99253326f56544

  • SHA256

    90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e

  • SHA512

    60a764f03ef44ab93027dd86a94329f604820a3ab5f8a37734394da6aea66e931f83645296e6187dcd2a6a309189bdbee3312046328d4404fe89a904bd0fcebd

  • SSDEEP

    1536:dPCHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt/9/B1Ar:dPCHY53Ln7N041Qqhg/9/2

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe
    "C:\Users\Admin\AppData\Local\Temp\90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\u7tdtnvy.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9599.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc960875A1FB564048B7A8BDE65A3DB05A.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2524
    • C:\Users\Admin\AppData\Local\Temp\tmp9470.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9470.tmp.exe" C:\Users\Admin\AppData\Local\Temp\90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9599.tmp

    Filesize

    1KB

    MD5

    c23d53d3a1300f1a5e2bcc12acae0f54

    SHA1

    0459cda98a75b6bf88d1d5cbc1fdc847c0209023

    SHA256

    99fe3b039b69042286308004ab767851ce9806753b61b40c9a3b32a2b1a13d10

    SHA512

    19f0eef32b8ed38a9d6e7ee17c0fd3beb165a415db7815f80085c0cab6499b350d225f0f22348e8904bf287984aab9189907d41e951e1e75ce2eb3b087882c10

  • C:\Users\Admin\AppData\Local\Temp\tmp9470.tmp.exe

    Filesize

    78KB

    MD5

    746e9995264183c0d472c6a0b1a36168

    SHA1

    a7ec648b5bbd46e4dbc0f5249e80585377764724

    SHA256

    2cd2cca5954807e7e24a255f12a226e6d326e2960823dbc9f0a94452c7fdc609

    SHA512

    e7e31363ac7828da314331557d62799099d85544a515d167f681012c7c5c7169e0838e78fabb389a5d1a556166a26e88738986ec3161595deff8a1465e300b12

  • C:\Users\Admin\AppData\Local\Temp\u7tdtnvy.0.vb

    Filesize

    15KB

    MD5

    a0bb919794444236393b30bc55a895bc

    SHA1

    e9bd889f60a713c79146b6e601e90f45e586cfb6

    SHA256

    adfca09f0141d909c62ad18b607ca62399704b09f1671bd7bcf645da7097425d

    SHA512

    0e2b1ffdefb8e0d907ce04c500552824d9570c488bd70c60a2416d519a21188ab12919bede73f21ba96d8d60dea4fcdee1c8073eef9973e76b52d12adcf2eae5

  • C:\Users\Admin\AppData\Local\Temp\u7tdtnvy.cmdline

    Filesize

    266B

    MD5

    29a10c67eee1507a11a5fa35889fd568

    SHA1

    91dd76dac458ff01eeb598640e4fa61796b64a7a

    SHA256

    bcb688225a745a6e8983bbc0db1c85f8770a530e5174e76658250b6a230f6363

    SHA512

    af1592bf3ec18fe70937606ad9fb67585207a59c116eb1368668e689ef69d4c2d97f4a25fcb22be12ffaffb8102eb6afb4554e76b8c9d68d008cb0ad6f49752c

  • C:\Users\Admin\AppData\Local\Temp\vbc960875A1FB564048B7A8BDE65A3DB05A.TMP

    Filesize

    660B

    MD5

    3bce0f932287d514b0138b57700793cd

    SHA1

    9af9fa560d08cde0a798d1a88eee46aff27e0fa0

    SHA256

    4d834b129a6cafb7fa10a53a23c714bd9ab6489fb4199bce876bcc8deea9b64d

    SHA512

    fbe7b478319b203406bc220b4d92cfd7c92e462c0264c3f73c5601d0c23161c8cd87325a61d573c28146c583acf628156ab1d7dd583a7c38261163cd8e176fd1

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/744-23-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/744-29-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/744-28-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/744-27-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/744-24-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/744-25-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/3124-0-0x0000000074912000-0x0000000074913000-memory.dmp

    Filesize

    4KB

  • memory/3124-22-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/3124-1-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/3124-2-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/4508-18-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB

  • memory/4508-9-0x0000000074910000-0x0000000074EC1000-memory.dmp

    Filesize

    5.7MB