Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    fab98623ff825ef3c56bf150ac25d34d.exe

  • Size

    78KB

  • MD5

    fab98623ff825ef3c56bf150ac25d34d

  • SHA1

    0aacdb9038e7cc75c3ab5f1e372443fd14169034

  • SHA256

    b390dbd5fb779b5cd769c4ff27bcb90b10b4516578ef184f0030008ad4413610

  • SHA512

    203052dfd4463b61374e0c7407fc3399198ed1a33ef89a22f85be41435a10b670128038ab16822eafc212841685eee27d7cf12c7bedea4948f01be021c5d6bff

  • SSDEEP

    1536:4V5jS9dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN6r9/615A:4V5jSon7N041QqhgE9/l

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fab98623ff825ef3c56bf150ac25d34d.exe
    "C:\Users\Admin\AppData\Local\Temp\fab98623ff825ef3c56bf150ac25d34d.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\v3wbtzzz.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9819.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE5CDEC8966AB4EDCAB87DA3036BD87.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2316
    • C:\Users\Admin\AppData\Local\Temp\tmp96B2.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp96B2.tmp.exe" C:\Users\Admin\AppData\Local\Temp\fab98623ff825ef3c56bf150ac25d34d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9819.tmp

    Filesize

    1KB

    MD5

    32b604cc8add4f8b70599437712cb01f

    SHA1

    914deb6988aa0d2850dd3f47f1f242a55043df1d

    SHA256

    bd50ce686a670941e0d6a701b095a03d4fcd84979319a134c74ccd6dec096434

    SHA512

    c5994ea2446c8a36c21333ba8ae444592a8f3998671087dc02f2e5305617ea2b349b3df28596ce9953682f26e56c38ee9d9b1c2e5574cc388de366803b7fa5d3

  • C:\Users\Admin\AppData\Local\Temp\tmp96B2.tmp.exe

    Filesize

    78KB

    MD5

    a864fd3de15e03cf2c528cbb5ba47b0c

    SHA1

    5666cca0b7a97f632a95099c9d2b4cf3f7adf618

    SHA256

    0d6a6c5a734182da8eafd2c0f2cba69fdfc86a5c658b657ece5cc7e9764ce5eb

    SHA512

    60bc23f90834af1f23d7315b021bd7ee846c056b2b10626fb005bd9edc4caa571e39f8cf7bf1b8737851027434aa09faae6493c03c704f6e30cb2d327c0a7f5a

  • C:\Users\Admin\AppData\Local\Temp\v3wbtzzz.0.vb

    Filesize

    14KB

    MD5

    b63495de2024f20863c4472580576051

    SHA1

    ee3f02d9c9ec38948b0c8fccf7a62176fab3933e

    SHA256

    1e3d781efa5ce549c884f5fefe028999bfd6bb34932ba5650f6487b65106ad67

    SHA512

    5430fd92d17e4fe124e316dae4462281002c9a9e206374ef618a47ac705a60e83598c6c89403bfded6b27c0348a157f70a8cdaedb582e83d60904eeefce86032

  • C:\Users\Admin\AppData\Local\Temp\v3wbtzzz.cmdline

    Filesize

    266B

    MD5

    ce0c6400d035395580c92f692bd83669

    SHA1

    0213ec15c8dcadd77ca31bea2dccbde77e6baf99

    SHA256

    d76872080cf791b076b07f11d543c3ebc8dd3a99fa0aec616b19b62a683fd489

    SHA512

    77bc2a2b37cf381dde51acaf41d9c973976d185881d464c599b7bf902753a7a43029f6f808ec111ca1c67af86d141cad681cacfeaeb543df886fcba3e6192500

  • C:\Users\Admin\AppData\Local\Temp\vbcE5CDEC8966AB4EDCAB87DA3036BD87.TMP

    Filesize

    660B

    MD5

    2bbacbee8c9eaf25307eca747fca9e79

    SHA1

    5fb4bdac118a0b0394f653c14f7ebcdfea354db7

    SHA256

    4f62c922dab781e89692925f3b6c653ea01dc09dd828ec474b7da1cf992e7fd5

    SHA512

    204e5b35e8dc5a52576583f6ad3f156b110bd5a26642de2da64968884dce46dc9bf603aee9680b4b5659f72e262dadce3bbcd60bf098036c50b825481dbc1a14

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1760-27-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/1760-28-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/1760-24-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/1760-22-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/1760-26-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2820-0-0x0000000075212000-0x0000000075213000-memory.dmp

    Filesize

    4KB

  • memory/2820-2-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2820-1-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/2820-23-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3668-9-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3668-18-0x0000000075210000-0x00000000757C1000-memory.dmp

    Filesize

    5.7MB