Overview
overview
10Static
static
10fe25de503f...5a.exe
windows7-x64
10fe25de503f...5a.exe
windows10-2004-x64
10fe282eaa90...45.exe
windows7-x64
10fe282eaa90...45.exe
windows10-2004-x64
10fe402f76d3...4d.exe
windows7-x64
10fe402f76d3...4d.exe
windows10-2004-x64
10fe55574c53...c0.exe
windows7-x64
1fe55574c53...c0.exe
windows10-2004-x64
5fe8a65a43d...3f.exe
windows7-x64
7fe8a65a43d...3f.exe
windows10-2004-x64
7fe99ddfdfc...6c.exe
windows7-x64
10fe99ddfdfc...6c.exe
windows10-2004-x64
10feb2c82a66...50.exe
windows7-x64
10feb2c82a66...50.exe
windows10-2004-x64
10fef2b831e5...91.exe
windows7-x64
8fef2b831e5...91.exe
windows10-2004-x64
8ff03c0c01a...cd.exe
windows7-x64
7ff03c0c01a...cd.exe
windows10-2004-x64
10ff1699c2d9...5a.exe
windows7-x64
10ff1699c2d9...5a.exe
windows10-2004-x64
10ff573ccb26...dd.exe
windows7-x64
10ff573ccb26...dd.exe
windows10-2004-x64
10ff5eef1816...3f.exe
windows7-x64
10ff5eef1816...3f.exe
windows10-2004-x64
10ff9b69031d...c2.exe
windows7-x64
10ff9b69031d...c2.exe
windows10-2004-x64
10ffc0421dee...0b.exe
windows7-x64
10ffc0421dee...0b.exe
windows10-2004-x64
7ffc45f2c58...73.exe
windows7-x64
10ffc45f2c58...73.exe
windows10-2004-x64
10fffa7ee6ec...91.exe
windows7-x64
10fffa7ee6ec...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
fffa7ee6ec076412930605bd55bbc491.exe
Resource
win7-20240903-en
General
-
Target
ffc0421deeff7949183a7fbc2e55850b.exe
-
Size
78KB
-
MD5
ffc0421deeff7949183a7fbc2e55850b
-
SHA1
5b888b2bf9e78a7c4c1eababc2446b748278c72c
-
SHA256
55d9d11da5706ae89bb9891ea49eb9c86b1bc7e253d7bd3cd5d4ce6c28a91a4c
-
SHA512
c2bb1eb1353ec4903555dac8371ac1740739f5a56976e81c5d6c904047f38c039bd6e302b889278663ddd66f63407f54601ea261919e3155fb8849dc6c35712c
-
SSDEEP
1536:dHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtM9/Q1GI:dHY53Ln7N041QqhgM9/m
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2568 tmpEBA6.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2692 ffc0421deeff7949183a7fbc2e55850b.exe 2692 ffc0421deeff7949183a7fbc2e55850b.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpEBA6.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffc0421deeff7949183a7fbc2e55850b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpEBA6.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 ffc0421deeff7949183a7fbc2e55850b.exe Token: SeDebugPrivilege 2568 tmpEBA6.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2700 2692 ffc0421deeff7949183a7fbc2e55850b.exe 31 PID 2692 wrote to memory of 2700 2692 ffc0421deeff7949183a7fbc2e55850b.exe 31 PID 2692 wrote to memory of 2700 2692 ffc0421deeff7949183a7fbc2e55850b.exe 31 PID 2692 wrote to memory of 2700 2692 ffc0421deeff7949183a7fbc2e55850b.exe 31 PID 2700 wrote to memory of 1740 2700 vbc.exe 33 PID 2700 wrote to memory of 1740 2700 vbc.exe 33 PID 2700 wrote to memory of 1740 2700 vbc.exe 33 PID 2700 wrote to memory of 1740 2700 vbc.exe 33 PID 2692 wrote to memory of 2568 2692 ffc0421deeff7949183a7fbc2e55850b.exe 34 PID 2692 wrote to memory of 2568 2692 ffc0421deeff7949183a7fbc2e55850b.exe 34 PID 2692 wrote to memory of 2568 2692 ffc0421deeff7949183a7fbc2e55850b.exe 34 PID 2692 wrote to memory of 2568 2692 ffc0421deeff7949183a7fbc2e55850b.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffc0421deeff7949183a7fbc2e55850b.exe"C:\Users\Admin\AppData\Local\Temp\ffc0421deeff7949183a7fbc2e55850b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\x2nyf07x.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC53.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEC52.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpEBA6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpEBA6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ffc0421deeff7949183a7fbc2e55850b.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5530d7b0f494a0c693e1065f80a727fc2
SHA1d0f6f608b0df26307c0bab7436d96681f7ad3e03
SHA2569a900b10c953d04360bd642eb47405ef26902ea74735a70409f64bf441f80dc9
SHA51262a95bd8bca314d95e06053c1495c930a96864d42834593600a7ab59d57b13e5cfdd598d36a408db06c4b2e4de2d77ffa1e6d223b8d9b50351a900d8ee685fce
-
Filesize
660B
MD5e8e7b48f21d3aadd4c9f3bf3dcef614d
SHA15c77ddcc72d8a16281a84cca6270a8d78de780d9
SHA256ef5b5275b9f12810932e196f2223f8920d32aa433f154f088d8149b84e76af50
SHA51247e10f8a062248c8599f17572159666a04724ce9e63bc34c91c69fa082934547421aca940f37648c7392dc5ea8155561a689e3c93aabfb89dd172d031091abf7
-
Filesize
15KB
MD5088eaeebc21710fb70be7e092a13933c
SHA158f89d36dd0a522c16463202a6f930ea6841f5c6
SHA2561e04ca229ad36f476a00a5b7d1d681d5bca41e2bbbc8e1d593d726f1e6dff44d
SHA51239b43af82f17eb4703fb82e2fa70f566e5cf181535c0df1bd2ee4e91892cf6ae8225c453f1a461870016a059d8d4866a21aaf59fa2c1a3e20c1479f24204d42d
-
Filesize
266B
MD598946842ff86b2d3187ada11bed13556
SHA19c8b2983bf0457bb65cbecb971dfc8be12cb9a25
SHA2566cbe05cee8cf20674a7c0a6048b00be82ac0807a7a31cd08f84fba8d82a1b408
SHA5124adb3299a1d0adb93dd38fd902172d6841a57034ccc913b943015f359d919ebcc3166f341cf200878fb596e6e78e7d4f65605ee9b92f4d6dc6d8e65bb508b1b9
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
Filesize
78KB
MD55718ea067d80822f5d14c1c7434a8a67
SHA17e9a0bc4d63f469de836e40cf472d9c7e52a6bab
SHA2565ff4eeded140081ccfc797534c1f10402ad316b6d61ae120e4c69245d8b3f94e
SHA5126e33fe09a1155e1803fa61d1ab124b3941f9fa578fb8f78754fae233a5a12e6be872d0af07eec0a6d7108f7f6b121cb62e8726f1bbc4e045f46b992f8b8161f1