Overview
overview
10Static
static
10cd94462486...32.exe
windows7-x64
10cd94462486...32.exe
windows10-2004-x64
10cdb97c07f0...ca.exe
windows7-x64
1cdb97c07f0...ca.exe
windows10-2004-x64
1cdfbee96df...25.exe
windows7-x64
10cdfbee96df...25.exe
windows10-2004-x64
10ce01fc8942...b5.exe
windows7-x64
10ce01fc8942...b5.exe
windows10-2004-x64
10ce5340f773...6e.exe
windows7-x64
10ce5340f773...6e.exe
windows10-2004-x64
10ce6d4255fc...f1.exe
windows7-x64
10ce6d4255fc...f1.exe
windows10-2004-x64
10ce8f0a3c5b...fc.exe
windows7-x64
8ce8f0a3c5b...fc.exe
windows10-2004-x64
8cef4f0409d...db.exe
windows7-x64
10cef4f0409d...db.exe
windows10-2004-x64
10cf15609eab...81.exe
windows7-x64
9cf15609eab...81.exe
windows10-2004-x64
9cf3f6f6285...6e.exe
windows7-x64
10cf3f6f6285...6e.exe
windows10-2004-x64
10cf450b1869...e9.exe
windows7-x64
10cf450b1869...e9.exe
windows10-2004-x64
10cf56059ae5...a1.exe
windows7-x64
10cf56059ae5...a1.exe
windows10-2004-x64
10cf79ab31cc...04.exe
windows7-x64
10cf79ab31cc...04.exe
windows10-2004-x64
10cf8d6b1a05...68.exe
windows7-x64
10cf8d6b1a05...68.exe
windows10-2004-x64
10cf96c893c9...10.exe
windows7-x64
1cf96c893c9...10.exe
windows10-2004-x64
1cfd31bf82d...9b.exe
windows7-x64
7cfd31bf82d...9b.exe
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:16
Behavioral task
behavioral1
Sample
cd94462486ad6fad4ab587ad00762632.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cd94462486ad6fad4ab587ad00762632.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
cdb97c07f0cbc499f78b386b2d398952a930a2715698d9b3589a5f4bb87ae2ca.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
cdb97c07f0cbc499f78b386b2d398952a930a2715698d9b3589a5f4bb87ae2ca.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
cdfbee96df9f657c44ea8ed17e90e025.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
cdfbee96df9f657c44ea8ed17e90e025.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
ce01fc8942b621016741e3fd96b711a32c6375ebea07247fab8b310c8b744ab5.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
ce01fc8942b621016741e3fd96b711a32c6375ebea07247fab8b310c8b744ab5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
ce5340f77345fe52a889a5f1543f19e4764b86984973180a8fae158fa960576e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ce5340f77345fe52a889a5f1543f19e4764b86984973180a8fae158fa960576e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
ce6d4255fc2065eaebf1bb640bffbef1.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ce6d4255fc2065eaebf1bb640bffbef1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
ce8f0a3c5b1faff7d414fc5d91588fa50e2806b342d348092d545ebc0a752bfc.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
ce8f0a3c5b1faff7d414fc5d91588fa50e2806b342d348092d545ebc0a752bfc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
cef4f0409df2a015e20411fdf8317582dc6ed5f56993dd0122b8006cd695c1db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
cf15609eaba6912ae9b6d7d424c25519f4a8ff30c550a599b00e2ec79d310681.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
cf15609eaba6912ae9b6d7d424c25519f4a8ff30c550a599b00e2ec79d310681.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
cf3f6f628505c197d6909686370e5f6e.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
cf3f6f628505c197d6909686370e5f6e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
cf450b1869e9064758b27a7df84b5117a9bdc5e448a47f5170904649fa7fefe9.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
cf450b1869e9064758b27a7df84b5117a9bdc5e448a47f5170904649fa7fefe9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
cf56059ae5d477487f8605c5301ceca1.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
cf56059ae5d477487f8605c5301ceca1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
cf79ab31cc7f483d3b8572ef14b47804.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
cf79ab31cc7f483d3b8572ef14b47804.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
cf8d6b1a05c4369c93e7cfd13bf472ffd3ca8206e8ea41e132069d5c485a2a68.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
cf8d6b1a05c4369c93e7cfd13bf472ffd3ca8206e8ea41e132069d5c485a2a68.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral29
Sample
cf96c893c9bc9bb1f6bbf4d1e00c0910.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
cf96c893c9bc9bb1f6bbf4d1e00c0910.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
cfd31bf82d7172bd87616d4d9310518d54d29699e851d81df254138d7e29859b.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
cfd31bf82d7172bd87616d4d9310518d54d29699e851d81df254138d7e29859b.exe
Resource
win10v2004-20250314-en
General
-
Target
ce6d4255fc2065eaebf1bb640bffbef1.exe
-
Size
78KB
-
MD5
ce6d4255fc2065eaebf1bb640bffbef1
-
SHA1
c0e4b4b8e72c833a611271413af7e43b5f286f62
-
SHA256
f9b2e7880f9fb79d57ef595c54d31d8a47f0cfbf9970b0fdef7f9e42f1c6d3c6
-
SHA512
b41b117caa136ff17e790e6304aa8b87f1cdc18c678cdc8763117510213e4bd8a4827bfee4f48175674d0c91a6b3ef4cbde0a86b85ce97233db1193183894ac2
-
SSDEEP
1536:zHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQte29/1M1U/:zHFo53Ln7N041Qqhge29/5
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation ce6d4255fc2065eaebf1bb640bffbef1.exe -
Executes dropped EXE 1 IoCs
pid Process 5068 tmp755F.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp755F.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce6d4255fc2065eaebf1bb640bffbef1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp755F.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3824 ce6d4255fc2065eaebf1bb640bffbef1.exe Token: SeDebugPrivilege 5068 tmp755F.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3824 wrote to memory of 5436 3824 ce6d4255fc2065eaebf1bb640bffbef1.exe 87 PID 3824 wrote to memory of 5436 3824 ce6d4255fc2065eaebf1bb640bffbef1.exe 87 PID 3824 wrote to memory of 5436 3824 ce6d4255fc2065eaebf1bb640bffbef1.exe 87 PID 5436 wrote to memory of 428 5436 vbc.exe 89 PID 5436 wrote to memory of 428 5436 vbc.exe 89 PID 5436 wrote to memory of 428 5436 vbc.exe 89 PID 3824 wrote to memory of 5068 3824 ce6d4255fc2065eaebf1bb640bffbef1.exe 90 PID 3824 wrote to memory of 5068 3824 ce6d4255fc2065eaebf1bb640bffbef1.exe 90 PID 3824 wrote to memory of 5068 3824 ce6d4255fc2065eaebf1bb640bffbef1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce6d4255fc2065eaebf1bb640bffbef1.exe"C:\Users\Admin\AppData\Local\Temp\ce6d4255fc2065eaebf1bb640bffbef1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t29sudix.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5436 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7678.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc34B63ACFDA7C406D9D5F586938B8BEC.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:428
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp755F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp755F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ce6d4255fc2065eaebf1bb640bffbef1.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51e5188474ddabdee32a67c05735cd3c5
SHA1c4a3d30bac22cfc9a3663db15fbc475d67341a82
SHA25676d780723f24b1593e3fbde710059d7bc44ac3fe74f7b1c5d0ae6bb0f95fa7a5
SHA5129a81b08cba937af34957ee0bb27283c72db566838740f34d4d9bae4b715016f03a211c20825c38bedcfdfbb208e922f9d8234820bd4fba2e7623b40f513adbd3
-
Filesize
15KB
MD5b86cfe1d3ad47abdfe3d6d4a7edb2368
SHA12a33a4ec2e9bc3e1a01691d370310cb9065974bc
SHA256a84df828ff90c3da7f6ad32a4651753c7a5be016d760c4afdfc9b3c97c52b1a5
SHA51264a222bbb34926115c04c951794071aa07c1928a2e59346fe95bef3be7fb04dfee679047aad4d8debf1ec03e50d05cee2f445e20058f2e9b5a3021b82ecb759a
-
Filesize
266B
MD519f88afa860e0e8b56c67b57a3878ec3
SHA1c4479dcca52bb6e5fbe45dcf7955a1311648f02a
SHA256295396745c979035517353b460a57a36de62825b72de4208f78ed1b9313baf16
SHA51218a8268efd57225d7db70d4d2af0fec0e44bf27d211730f24e7980cce6327dc4957bbcec09e909d551ce16949cf2b657103c075ee9ef2b953959398db2f8c592
-
Filesize
78KB
MD557a27bf38b0f6ebe7bcc842ddd92738b
SHA133a180e45bbf6b4435679f44df447b39401d350c
SHA2564acafdd1c3c47605c36f39c06c282a2a199b1fc7f10e27e162f6895013c096d4
SHA512803143f55e8f2a143fa70bbdf8c5149e0daf2c3ade1279a07ff168720c4f15dbafccd8ff18f030d8958b2f886df82929e571409c5fe5ea6aa0a1bd9071e31764
-
Filesize
660B
MD51ab995bf168b8b9b92cacd65606967b3
SHA1012bb020e52cf8afcbf94842a619f4ffb7acb328
SHA2563eb932d7bebfd588424d0da76bd14e2a7a7f9942502d2c8b482ab9ffad037643
SHA512bfa8f18e78839c45df2757b5d2e690e4758aa847548fca427a9c6259ca2c0e00c831f89613a22b1cd566f00f4d8ac6774de995dc99f5fef51f8e3a5bd98e588d
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65