Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:15

General

  • Target

    b9d4ce458330a463e0bbea9c825699bc.exe

  • Size

    78KB

  • MD5

    b9d4ce458330a463e0bbea9c825699bc

  • SHA1

    5c290ad3db5b0d28582215169eab4cd2effa9bdc

  • SHA256

    d70b6fb644a5c04cfe2cf77146444b2e35caaa7d2e24ccdf90db816c13370de6

  • SHA512

    7ad319239ef8d1a0ecff1ef5b6db64a4cdd9d084eda697433aa6edabc1f93ff5eb3b10c1159919e678f11fcc88e4490620de1b983ee2d0921602acb647574015

  • SSDEEP

    1536:BsHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtR9/Z81kh:BsHY53Ln7N041QqhgR9/D

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9d4ce458330a463e0bbea9c825699bc.exe
    "C:\Users\Admin\AppData\Local\Temp\b9d4ce458330a463e0bbea9c825699bc.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5372
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vgnd0ss_.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6F06.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3BBE82A5B0AC44559E447816B18333.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2076
    • C:\Users\Admin\AppData\Local\Temp\tmp6DCD.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp6DCD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b9d4ce458330a463e0bbea9c825699bc.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES6F06.tmp

    Filesize

    1KB

    MD5

    eb28e39eb1da6e4256b9cc992ea3b995

    SHA1

    09226c51d9e209c86eec9eec164cad7263eb1b35

    SHA256

    847ef18e696abf6ed94d4e47ec237256b0af88c5d6c4fb8491e221b2feb7eb04

    SHA512

    d7c4e9d53bf6463814322e451b18fb5ce59b42cd869d4f20db0ad1e8e0a5ed577ba1623e7fec4c513409896335748a09ba2133a3241e6609c26da27c2e2b53b3

  • C:\Users\Admin\AppData\Local\Temp\tmp6DCD.tmp.exe

    Filesize

    78KB

    MD5

    dc7ff3172ec787247f42feae867ca937

    SHA1

    edbb8e0f20003fe7a71ef9a056db9e0e5f4732c6

    SHA256

    b90fc9a6ce668c2e27853a21509e5ffe7f60bce16522165a8c35417d39de36ab

    SHA512

    5eb812b383360bfe5d3eb0810f2f7940dd3d48fc8b261466776d881c4a266eafa4caaefbdfdf89654690e3faf57bfa8419f7e18cf228a81c4fb39c8f1c2fb11e

  • C:\Users\Admin\AppData\Local\Temp\vbc3BBE82A5B0AC44559E447816B18333.TMP

    Filesize

    660B

    MD5

    0323e42f8d008b02986cf558babee5d5

    SHA1

    1f6c6ef634c397804415a27bfdbb04c7c0d56e26

    SHA256

    2f171f15f336e21c6aa47cd2b4b3b826007742db7db22ed33f86e71a1a8a225f

    SHA512

    a70a2127a06824c562c98e0fadae6b6497061f6fec99f3c6468d2b5e35b55853c9cf4ba4483fc8f636301bccd239cd5610e950d53171cb816f3fd6db83f1143e

  • C:\Users\Admin\AppData\Local\Temp\vgnd0ss_.0.vb

    Filesize

    15KB

    MD5

    293b8ed7dd7149954c782f725c0c02d4

    SHA1

    0487899cbcf731b93ad13adce27ba7c638f94a0c

    SHA256

    5bdb12afa750b25cc511cf602c07172ebf92f9561131e49f42e7fb08d8439698

    SHA512

    b7b39969cf56926995dda983d5836b561afc2a23b3322549ca39efd28290cee33e64c924025a3e944b3447f3f43bfb56166f27efbf888f0ddfe19e5ee50f478e

  • C:\Users\Admin\AppData\Local\Temp\vgnd0ss_.cmdline

    Filesize

    266B

    MD5

    8253761abeea345f28899696199d62b5

    SHA1

    ff0b444cf69a477cb7e9a08af2401d9db8fc1f0c

    SHA256

    6394c6f394e13451ee5164d47674d3bd3b4e745eb29bb0399badd9d8f73f7f6c

    SHA512

    d9e82483be06e877f01833e5a1afd725df320abdc657c2469f6ca2a8cceeedf6a727166d2bb7372a4315c21352e0b1e8b2cf06f0db6a673883a55898eb608c0d

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2932-18-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-9-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5048-24-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5048-23-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5048-25-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5048-27-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5048-28-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5048-29-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5372-2-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5372-1-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5372-22-0x0000000074BD0000-0x0000000075181000-memory.dmp

    Filesize

    5.7MB

  • memory/5372-0-0x0000000074BD2000-0x0000000074BD3000-memory.dmp

    Filesize

    4KB