Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:15

General

  • Target

    b9d4ce458330a463e0bbea9c825699bc.exe

  • Size

    78KB

  • MD5

    b9d4ce458330a463e0bbea9c825699bc

  • SHA1

    5c290ad3db5b0d28582215169eab4cd2effa9bdc

  • SHA256

    d70b6fb644a5c04cfe2cf77146444b2e35caaa7d2e24ccdf90db816c13370de6

  • SHA512

    7ad319239ef8d1a0ecff1ef5b6db64a4cdd9d084eda697433aa6edabc1f93ff5eb3b10c1159919e678f11fcc88e4490620de1b983ee2d0921602acb647574015

  • SSDEEP

    1536:BsHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtR9/Z81kh:BsHY53Ln7N041QqhgR9/D

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9d4ce458330a463e0bbea9c825699bc.exe
    "C:\Users\Admin\AppData\Local\Temp\b9d4ce458330a463e0bbea9c825699bc.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\avclgqsf.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE570.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE56F.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1804
    • C:\Users\Admin\AppData\Local\Temp\tmpE4C4.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpE4C4.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b9d4ce458330a463e0bbea9c825699bc.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESE570.tmp

    Filesize

    1KB

    MD5

    7473f7565aef6d10e87aa77b85e5b50a

    SHA1

    f59e23877b3c23601bce086e5f589e542d3e654d

    SHA256

    5c62c9d6b0d20767bf7e64787bbbcd75bed802d9b876897ccae5af0479935b49

    SHA512

    8bf194d4066281b5d033790a6b1209acd4fea06947084bf6aedfeb011ed54b77069749248b954edc503a5655ac36c398aa73190daa190b5c76ae6bb77b22845c

  • C:\Users\Admin\AppData\Local\Temp\avclgqsf.0.vb

    Filesize

    15KB

    MD5

    6e2085f6239cec4a5014825037213d0c

    SHA1

    5ddde740bce7732a1a7de87d4116086713ffd925

    SHA256

    ede79af141b63149dcb8d08f855cb3ad1c3173521269bd9296789385ad3ca2da

    SHA512

    355ea57df4e5d55ac1da3ea71efe7b82e9c637150d473c4261b0d1ca219942cfa65130364843b1d1d1e52cfbaa4ee6581ab4d4b0c979b3da5db9e8ea920e2ac8

  • C:\Users\Admin\AppData\Local\Temp\avclgqsf.cmdline

    Filesize

    266B

    MD5

    6ec545bb4f0652b7727e47e369867564

    SHA1

    68eaab34193978eccd0befca010f8de06094d9ea

    SHA256

    081757838a4f19eab445ca711bf643911f410885c3300e53895d08f6c825c1f7

    SHA512

    e0270da9b85a39a4525b0b59127897022e226d1619e39659670739426dab0fa52acac7d9fc16a0c661b56d0e368342bb9ebf3be716c787316738a7c7abf53e28

  • C:\Users\Admin\AppData\Local\Temp\tmpE4C4.tmp.exe

    Filesize

    78KB

    MD5

    4b33fa5222d42e57d8d2cb6e34aa4244

    SHA1

    eb6ad51bc90507b093baffabfca392ad3f49ca7a

    SHA256

    93b6b3f1dd7a7ae764a5d1a71d125fbad293b47a162f5f328bceebb8ed57f2ae

    SHA512

    cfb8fa97c785675429d696b3219bbd94d071b87514c2787ed3bc0299f47a901d12e937db785111ebbfdc19f5cf4e633e90bf3f8be6de10a76f8dcc237b44eac5

  • C:\Users\Admin\AppData\Local\Temp\vbcE56F.tmp

    Filesize

    660B

    MD5

    5f745ed68942bf5fa9e314716334d683

    SHA1

    c1d768b67c999c56b991f9d0294f7e229b55fec8

    SHA256

    5a7cd277736ee9fe5062d4c2a3bb07238adfc7d9e4924dd6919926e7976c0407

    SHA512

    758e50ec0ba845b163b37e5191a672ce2995d62a11485d584572d82abdacd576462c5504b3fddb9dc563b4c0c9b5ef0fb6d26e76dcf441582462a6c7a914c10c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1200-8-0x0000000074F00000-0x00000000754AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1200-18-0x0000000074F00000-0x00000000754AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2464-0-0x0000000074F01000-0x0000000074F02000-memory.dmp

    Filesize

    4KB

  • memory/2464-1-0x0000000074F00000-0x00000000754AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2464-2-0x0000000074F00000-0x00000000754AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2464-24-0x0000000074F00000-0x00000000754AB000-memory.dmp

    Filesize

    5.7MB