Analysis
-
max time kernel
143s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2025, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe
Resource
win10v2004-20250217-en
General
-
Target
4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe
-
Size
78KB
-
MD5
0e8e21864547ecde60c6d1747016c0a9
-
SHA1
087492c141051e9ef01b5617f62af826aa800e0f
-
SHA256
4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2
-
SHA512
6fba64291a2b76d3eeb5d63e9aec9097ec9b7f6c1835976dd3d29aa9ea9b202c8361954a0f8ac8b9969db4e09e626662e72974600630c8b2d2119e1381e975b1
-
SSDEEP
1536:BWtHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQter9/G1Xf:BWtHY53Ln7N041Qqhger9/c
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe -
Executes dropped EXE 1 IoCs
pid Process 4456 tmp7A31.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp7A31.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7A31.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe Token: SeDebugPrivilege 4456 tmp7A31.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2516 2108 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe 87 PID 2108 wrote to memory of 2516 2108 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe 87 PID 2108 wrote to memory of 2516 2108 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe 87 PID 2516 wrote to memory of 4772 2516 vbc.exe 89 PID 2516 wrote to memory of 4772 2516 vbc.exe 89 PID 2516 wrote to memory of 4772 2516 vbc.exe 89 PID 2108 wrote to memory of 4456 2108 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe 90 PID 2108 wrote to memory of 4456 2108 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe 90 PID 2108 wrote to memory of 4456 2108 4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe"C:\Users\Admin\AppData\Local\Temp\4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\apqub1og.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7C15.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc12F9A8CDDC504A30BCDB9015619E2DFF.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7A31.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7A31.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4f46bea84881f0a2a900afb1a86742bfd3bb531c0e0ef5c69567518a5966d4b2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD512f4afc0df76517337d4bf642f1e9b21
SHA1772ecff38e03c6b80973aa89107ca5009636203b
SHA256db921d88259925e8fe569c70c4f4303ef00055101e0ecfa79cfc294022d8cb21
SHA5120523eb55d26c46c5540b9304c6ca146d81e50e6f60ae5f7e44f5bc0a44f06d77adf5f6801c17245a6bd27ea644ee2c038268adfc14a0465c9c63db21bf29385f
-
Filesize
15KB
MD5ce394ea71f907e563a1cf0aeef27820f
SHA144375a68c5ce9055f1b2910a08578a5ea2be8593
SHA2561e405591a11771452f82527369e50de4ef67acd691258c1aa01413b15f76b6ff
SHA512aa5b1d6674aa47cbb79f5979d4810e16b6a08d7dd243553b5b18fc6862eca7042920a8219387621e9fb8f459f0f3a95c17f9044e45469506e6e06674f8a341ed
-
Filesize
266B
MD5dc30f25fa18676459053642f0415c7a2
SHA1a186ce60884d7196adca5ab7e90fa024509b4346
SHA2566b41b6c8f3dad11d68dc54356302f801e46bf471c0763a96374e04517cd760b4
SHA51211a0fc30ad24374276600975b50aea965b91860aef3f6d0081942489fc9ac20b94e273f1a9ced1e47ab5623e8758056552e210876ec50c32ea263308ea9e1939
-
Filesize
78KB
MD54a49bca5b63d11637a0c5a31eb1b8f00
SHA1c295fd75f28f12a158b3c1be44bd9a79fed5a326
SHA25656b83453b93f98b374ea204ef59118062a1c76e1c749da23ca0621e9a0776b97
SHA512183127f44ea5d76f4f7cd96712b3f8ddd3fa460a03da9088c50b7352d0ffc8797160eadb1247abc950f093dc4e0248163add326864818c8855637baeff98ab21
-
Filesize
660B
MD59c4386ff8da6d1f8c395c9fa85e8eb0d
SHA1dc7ee35eeaefbcbc016d1d51fdc4f9c487cf3c64
SHA256381addd657a43320f7c93b3b19fd193e8c37c9dcf5f29bb6fb21b964909a6aea
SHA51292395c60674bd34953de6c0b8746b8fda32da10ac476c4c7e0744954a5e07745b6b9cdff90d34d3c0cfb4cee525790449e80e85d644ca638e203168a7da86158
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65