Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    ff573ccb268f734e737c764bc60f0ddd.exe

  • Size

    78KB

  • MD5

    ff573ccb268f734e737c764bc60f0ddd

  • SHA1

    f6307bb87f39aff19b50aa309ad56ea22eb69f65

  • SHA256

    42e0a790c9bbab15940b9e180973a701e2cc10b1bbfe1e2bd7cb2fca96033fed

  • SHA512

    cc143a391b8793609d22fba916ed5ee12719bfd169f31c43cffe926c7bed1c10da17ed7e98ef4cce4709f1000f2b77b558cac1d33be5d72e4e229b688cbf99d9

  • SSDEEP

    1536:SRWV586dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6p9/I16D:SRWV581n7N041Qqhgx9/5

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff573ccb268f734e737c764bc60f0ddd.exe
    "C:\Users\Admin\AppData\Local\Temp\ff573ccb268f734e737c764bc60f0ddd.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ewkptiku.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8D52.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8D51.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1884
    • C:\Users\Admin\AppData\Local\Temp\tmp8CD5.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp8CD5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ff573ccb268f734e737c764bc60f0ddd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8D52.tmp

    Filesize

    1KB

    MD5

    b024f2780ea041eb51e4f80877032b83

    SHA1

    f7d33d5889bf7bc57c3ce22b114d30ffc33b8162

    SHA256

    867296b013e66c648d8a7dac82f5dcf0d39bab6b18243de165deb6ecbf2b052e

    SHA512

    c531b12b12688eff6ae59a838fa2fcaa274ecb896fedab78974de403aa362fbf250c7a0b63b43097be31a1a0120a38bf1e491bc6fbba5cb963c7e003e9929a6f

  • C:\Users\Admin\AppData\Local\Temp\ewkptiku.0.vb

    Filesize

    14KB

    MD5

    f871d2d31520c52427fe8bed374dc5e0

    SHA1

    0a9cf20b1ef8e5c6135f236968bb0308240a1e8d

    SHA256

    6267ac35f0511c2bb89580fafe8b0f567d8a9f5ddf706588532f5ac6dea10802

    SHA512

    1dc0ae37e9dc599f73881e99d6b5b262f6c96ab13413ccccedca0ba818cd751ac863d1f78226d1b14690914a7fabc3aeaef20345774490f763ab6b7f87ec3190

  • C:\Users\Admin\AppData\Local\Temp\ewkptiku.cmdline

    Filesize

    266B

    MD5

    ccbd59cc8bc2ce8c25d18f7c089ac4b5

    SHA1

    c7e6ddbaecb38866df9c07d70289ead70a997da4

    SHA256

    03efb39cb23e6bc3299f2b85ebbb71c6e153ef459ee59ea189fe761f76087cc1

    SHA512

    597a66a121a828b7619a6d47445ac686d7eb4d9a989c7ca6aaf0d310d3bbc3f5dabd47e341eb509e5cedbc2bcdb1ffb9fb424aac5e183e92b723d47d3c6199a4

  • C:\Users\Admin\AppData\Local\Temp\tmp8CD5.tmp.exe

    Filesize

    78KB

    MD5

    ad245e81c51d00a510bbb908d87b4eb4

    SHA1

    b8791b1e96a04f27c9dd771ddaf2766d730321a9

    SHA256

    56fe43670ca9260efc2a55d08e6ca340e746d1366b96055cd30cf0565343ec1a

    SHA512

    22741e6f652d3dfd3afcfbf4241efaecddab786a740e09af536b1f67bfa7a3df882e9b72334bbfcd9df5893a7c996b786de6581f5fec99b01341f1fccb45ef26

  • C:\Users\Admin\AppData\Local\Temp\vbc8D51.tmp

    Filesize

    660B

    MD5

    5f51c30135a44587e5fe64917f298bf4

    SHA1

    58288c5752da2962344db4ddfb344cc74d3c1e5b

    SHA256

    f43b8412a716ccd7ecaf74ea9764c923dcd466e56c9d1d7bb551d33e85889c48

    SHA512

    18ccf1f5fb2e784e642cd2d05af04cdc55e31673064ca23db494eb575a83e28d2c63d8aee474dd4273c1a43efd31b8d0a5d90916f59f6ba9293bc4e8aafc7f28

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2840-8-0x0000000074910000-0x0000000074EBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-18-0x0000000074910000-0x0000000074EBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2844-0-0x0000000074911000-0x0000000074912000-memory.dmp

    Filesize

    4KB

  • memory/2844-1-0x0000000074910000-0x0000000074EBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2844-2-0x0000000074910000-0x0000000074EBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2844-24-0x0000000074910000-0x0000000074EBB000-memory.dmp

    Filesize

    5.7MB