Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe
Resource
win10v2004-20250217-en
General
-
Target
90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe
-
Size
78KB
-
MD5
7398657f6e29412c7b7b60fadd719f11
-
SHA1
615e1d808eecfc48cafc46645f99253326f56544
-
SHA256
90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e
-
SHA512
60a764f03ef44ab93027dd86a94329f604820a3ab5f8a37734394da6aea66e931f83645296e6187dcd2a6a309189bdbee3312046328d4404fe89a904bd0fcebd
-
SSDEEP
1536:dPCHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt/9/B1Ar:dPCHY53Ln7N041Qqhg/9/2
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe -
Executes dropped EXE 1 IoCs
pid Process 744 tmp9470.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp9470.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9470.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3124 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe Token: SeDebugPrivilege 744 tmp9470.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4508 3124 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe 88 PID 3124 wrote to memory of 4508 3124 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe 88 PID 3124 wrote to memory of 4508 3124 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe 88 PID 4508 wrote to memory of 2524 4508 vbc.exe 91 PID 4508 wrote to memory of 2524 4508 vbc.exe 91 PID 4508 wrote to memory of 2524 4508 vbc.exe 91 PID 3124 wrote to memory of 744 3124 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe 93 PID 3124 wrote to memory of 744 3124 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe 93 PID 3124 wrote to memory of 744 3124 90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe"C:\Users\Admin\AppData\Local\Temp\90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\u7tdtnvy.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9599.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc960875A1FB564048B7A8BDE65A3DB05A.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9470.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9470.tmp.exe" C:\Users\Admin\AppData\Local\Temp\90fa4a03b9d36758c59a51702839a62cc1e551bf45ae32c07f29666de7a7bd5e.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c23d53d3a1300f1a5e2bcc12acae0f54
SHA10459cda98a75b6bf88d1d5cbc1fdc847c0209023
SHA25699fe3b039b69042286308004ab767851ce9806753b61b40c9a3b32a2b1a13d10
SHA51219f0eef32b8ed38a9d6e7ee17c0fd3beb165a415db7815f80085c0cab6499b350d225f0f22348e8904bf287984aab9189907d41e951e1e75ce2eb3b087882c10
-
Filesize
78KB
MD5746e9995264183c0d472c6a0b1a36168
SHA1a7ec648b5bbd46e4dbc0f5249e80585377764724
SHA2562cd2cca5954807e7e24a255f12a226e6d326e2960823dbc9f0a94452c7fdc609
SHA512e7e31363ac7828da314331557d62799099d85544a515d167f681012c7c5c7169e0838e78fabb389a5d1a556166a26e88738986ec3161595deff8a1465e300b12
-
Filesize
15KB
MD5a0bb919794444236393b30bc55a895bc
SHA1e9bd889f60a713c79146b6e601e90f45e586cfb6
SHA256adfca09f0141d909c62ad18b607ca62399704b09f1671bd7bcf645da7097425d
SHA5120e2b1ffdefb8e0d907ce04c500552824d9570c488bd70c60a2416d519a21188ab12919bede73f21ba96d8d60dea4fcdee1c8073eef9973e76b52d12adcf2eae5
-
Filesize
266B
MD529a10c67eee1507a11a5fa35889fd568
SHA191dd76dac458ff01eeb598640e4fa61796b64a7a
SHA256bcb688225a745a6e8983bbc0db1c85f8770a530e5174e76658250b6a230f6363
SHA512af1592bf3ec18fe70937606ad9fb67585207a59c116eb1368668e689ef69d4c2d97f4a25fcb22be12ffaffb8102eb6afb4554e76b8c9d68d008cb0ad6f49752c
-
Filesize
660B
MD53bce0f932287d514b0138b57700793cd
SHA19af9fa560d08cde0a798d1a88eee46aff27e0fa0
SHA2564d834b129a6cafb7fa10a53a23c714bd9ab6489fb4199bce876bcc8deea9b64d
SHA512fbe7b478319b203406bc220b4d92cfd7c92e462c0264c3f73c5601d0c23161c8cd87325a61d573c28146c583acf628156ab1d7dd583a7c38261163cd8e176fd1
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65