Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2025, 23:09

General

  • Target

    46233658f6499adbb58501d286792830234e7a476c6739b9e6f0c72523ff0c81.exe

  • Size

    78KB

  • MD5

    ebf1474d2a83176252bfcb948af8c175

  • SHA1

    4f07e9560e3960257e099df00b06e0c6982bcda8

  • SHA256

    46233658f6499adbb58501d286792830234e7a476c6739b9e6f0c72523ff0c81

  • SHA512

    d1cdd8903151d0f523fc298563b9026c7fa580ec9caab33fed926a28639ab3d76ad59228a3c847df12babeee544e760f390927423da919c051f8e7eb10a62696

  • SSDEEP

    1536:k5jSVdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt96Y9/hD11F:k5jSAn7N041QqhgT9/hJ

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46233658f6499adbb58501d286792830234e7a476c6739b9e6f0c72523ff0c81.exe
    "C:\Users\Admin\AppData\Local\Temp\46233658f6499adbb58501d286792830234e7a476c6739b9e6f0c72523ff0c81.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ujfgn8m4.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF097.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF086.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1856
    • C:\Users\Admin\AppData\Local\Temp\tmpEFDB.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpEFDB.tmp.exe" C:\Users\Admin\AppData\Local\Temp\46233658f6499adbb58501d286792830234e7a476c6739b9e6f0c72523ff0c81.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESF097.tmp

    Filesize

    1KB

    MD5

    c9da2746ac08043ba8ccfdcebcb607d9

    SHA1

    13e35861e69612727bb2c3472cc894c8b2f69de7

    SHA256

    81bc05894e021302d5a6fc10771a0e4a01a5a6a9da24c01f8739c7c821f67eaf

    SHA512

    0ae04729db08caf7e89a565ec1061e940fc0c86759500f9738dc5063ef8d20f58e4be85b6d6ebbdc8765a19a13b663bced67243ec23f902a577b687c473f8807

  • C:\Users\Admin\AppData\Local\Temp\tmpEFDB.tmp.exe

    Filesize

    78KB

    MD5

    8100ddf856b7bfb38f0505f8df1d75b3

    SHA1

    e21298acfb8dd51adef97a1f3cfab6a3829be465

    SHA256

    9f4b8b685e2e567d7350ff036c9a80093d8e183b94d5be2fcc87ac599a2c80ee

    SHA512

    8e874dc70cacd4f7a7d3c3fe2d755760c7658d96b71e2cbe40b16397bf131d0871bb1c02a1cf051da6b154de3ef0dd49986bd5d44bb348b262b241d4098311b3

  • C:\Users\Admin\AppData\Local\Temp\ujfgn8m4.0.vb

    Filesize

    14KB

    MD5

    46189e75a7dc4b87df0dd44f99ffc756

    SHA1

    68c32024ceeda402ec271165e596ef558a7cb60b

    SHA256

    d26af322573c0b560ab5779643eec7bd51a91559429ef0783833ec5fd97f0b7c

    SHA512

    feea64c02e5d80819f8b8ceb5aa3ecdd66afb02573e80dad96b039e8dcf5923e9a310b709fc1506b41ff62a4378d56162df259e1cf9551f52bec7625859ad033

  • C:\Users\Admin\AppData\Local\Temp\ujfgn8m4.cmdline

    Filesize

    266B

    MD5

    27d3d068f4fc0666b32c8d229b4d2a98

    SHA1

    6d45f32e682a78525fd9f9e991847a05c220901f

    SHA256

    f7b9f312a4f5df6fba18731881a316245e1698f80f471ce079ac6dee95a0fd08

    SHA512

    0ee762d32463273d4f8da7578f91cc7360a6f208edb118a35bcb0790507c5796ccbe410c68a90eaf282b253fed0ea8b6bc32947048ae6071af7dcbc866071034

  • C:\Users\Admin\AppData\Local\Temp\vbcF086.tmp

    Filesize

    660B

    MD5

    ec24183925f8d79233191a312fa1f44b

    SHA1

    ce9e0e593666dc5e55d92ef4d8383e55e4917d3e

    SHA256

    87ba34a48f92631983fd51ad897ee15ae599cd22ccea7891ea3a5186aa4de467

    SHA512

    d5b0626d4a8bafe539913f17a0394aefe3445fb7f7ac2d6c59d9264820c8f75c7ab469979d9a6504934cfb1b049aad71391284f2367370538202d2cdda34011b

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2236-0-0x0000000074471000-0x0000000074472000-memory.dmp

    Filesize

    4KB

  • memory/2236-1-0x0000000074470000-0x0000000074A1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-2-0x0000000074470000-0x0000000074A1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-24-0x0000000074470000-0x0000000074A1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2788-8-0x0000000074470000-0x0000000074A1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2788-18-0x0000000074470000-0x0000000074A1B000-memory.dmp

    Filesize

    5.7MB