Analysis

  • max time kernel
    141s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:15

General

  • Target

    b9eb72c6666c879fe3b7532bbf050b72.exe

  • Size

    78KB

  • MD5

    b9eb72c6666c879fe3b7532bbf050b72

  • SHA1

    8d35f944aa44bfd898c51b9645ba98f33298d458

  • SHA256

    989b61ad0d18110a3b953a90885bc9a1f4dadec6a5958d43890e9189506719bc

  • SHA512

    8b8665064c587332405648d578865d63e6edcc504045ef71f2e9cdfed9bb626053cbb543d2fd0bdb037f99b22c49c9c9fe0eae46c65d5154b896567dd3f22f71

  • SSDEEP

    1536:LHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtRb9/o1bM:LHFo53Ln7N041QqhgRb9/9

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9eb72c6666c879fe3b7532bbf050b72.exe
    "C:\Users\Admin\AppData\Local\Temp\b9eb72c6666c879fe3b7532bbf050b72.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5180
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ofxyk5y9.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES606F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB1E0DB7F3A3249FBB3761483E6FFEF56.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5080
    • C:\Users\Admin\AppData\Local\Temp\tmp5F08.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp5F08.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b9eb72c6666c879fe3b7532bbf050b72.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES606F.tmp

    Filesize

    1KB

    MD5

    69e0bdd15e741a959c0c05744d998c0c

    SHA1

    ad761ebe62e11b33c7e82ded9c314075e1824e60

    SHA256

    1a9e2a0d2db1e9cb8c1f5106931056f4b10975a0d0c690f03a35e6942b95acad

    SHA512

    ef2e7de716060b896aaf5a416d10496ca9452372b97d0b5de47170605307844ebd55dab78040ab5feba672d422fa7de17452dc430779ba855e4f3ee7a2230374

  • C:\Users\Admin\AppData\Local\Temp\ofxyk5y9.0.vb

    Filesize

    15KB

    MD5

    eb0dd971ec63bc5c5cce15a48cf11522

    SHA1

    5aa150a5922391ea19e8100786e616538fc5eab6

    SHA256

    29eb097c8499050d1500d55ba1c0226d52b1cb675fdac42e9bda9d95414454d3

    SHA512

    f66d51a95942c11d0b86c14f5c3274aae7e8d627fcddbb3a97b74eafd8d02e602d57323cd216d898fa2e50bda6f2c609af9f4cbf705e433f2b42b108ad1a8dc1

  • C:\Users\Admin\AppData\Local\Temp\ofxyk5y9.cmdline

    Filesize

    266B

    MD5

    19063928db287bf531be21f71eae113b

    SHA1

    57df70a486c548d96f2c09dbaac5960d3c466059

    SHA256

    1f2aa445bae82b2f54cd771770f1f53d08ab84d99758b8b7745e97b96acb6914

    SHA512

    49bad3e3327cb1c89af91ce0712b4335c2b1c72df8e396aa53af144cb4c08b3e805704e97b5bde0cc7c7403c97d23099d74a57cfc379715c3f078d267f9db371

  • C:\Users\Admin\AppData\Local\Temp\tmp5F08.tmp.exe

    Filesize

    78KB

    MD5

    b1f42ecd8343392c07e5f5c5490b0aec

    SHA1

    f4ad58eb294a3b235cde7135aee17763384d7523

    SHA256

    ff7d3e103ece96ee9594c9f7dbf72bc72e49779f36af44129cc33c2773c0476d

    SHA512

    7ed36c7c163ac182c76b26aaf4895fb9cb182aff74c8396d651421875dc550e127b6adcad7950e79741e92d9b936ef477600d5f1a4cc9079c99790662891a8d7

  • C:\Users\Admin\AppData\Local\Temp\vbcB1E0DB7F3A3249FBB3761483E6FFEF56.TMP

    Filesize

    660B

    MD5

    c94fb8371113e743d5b5deb56682fc74

    SHA1

    dd93afc64400bd5db835d0f6ab74b7a92d29c9fe

    SHA256

    93814f36380c5d0db86e7d40c6c96a8b8c6bbd091ad87f3993044bb22127e2a5

    SHA512

    0f64a77bfaf39f066823bfa0aa5c5078e7f62b9fc330575a365480e09493b9cc9427b8461efe3e7ecf1d5a4d38132bb16b635699feeaa18d9dde13b9ee2e2623

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1824-23-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/1824-24-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/1824-25-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/1824-27-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/1824-28-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/1824-29-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/4224-9-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/4224-18-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/5180-2-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/5180-1-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/5180-22-0x0000000074BE0000-0x0000000075191000-memory.dmp

    Filesize

    5.7MB

  • memory/5180-0-0x0000000074BE2000-0x0000000074BE3000-memory.dmp

    Filesize

    4KB