Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    ffc0421deeff7949183a7fbc2e55850b.exe

  • Size

    78KB

  • MD5

    ffc0421deeff7949183a7fbc2e55850b

  • SHA1

    5b888b2bf9e78a7c4c1eababc2446b748278c72c

  • SHA256

    55d9d11da5706ae89bb9891ea49eb9c86b1bc7e253d7bd3cd5d4ce6c28a91a4c

  • SHA512

    c2bb1eb1353ec4903555dac8371ac1740739f5a56976e81c5d6c904047f38c039bd6e302b889278663ddd66f63407f54601ea261919e3155fb8849dc6c35712c

  • SSDEEP

    1536:dHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtM9/Q1GI:dHY53Ln7N041QqhgM9/m

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffc0421deeff7949183a7fbc2e55850b.exe
    "C:\Users\Admin\AppData\Local\Temp\ffc0421deeff7949183a7fbc2e55850b.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\x2nyf07x.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC53.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEC52.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1740
    • C:\Users\Admin\AppData\Local\Temp\tmpEBA6.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpEBA6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ffc0421deeff7949183a7fbc2e55850b.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESEC53.tmp

    Filesize

    1KB

    MD5

    530d7b0f494a0c693e1065f80a727fc2

    SHA1

    d0f6f608b0df26307c0bab7436d96681f7ad3e03

    SHA256

    9a900b10c953d04360bd642eb47405ef26902ea74735a70409f64bf441f80dc9

    SHA512

    62a95bd8bca314d95e06053c1495c930a96864d42834593600a7ab59d57b13e5cfdd598d36a408db06c4b2e4de2d77ffa1e6d223b8d9b50351a900d8ee685fce

  • C:\Users\Admin\AppData\Local\Temp\vbcEC52.tmp

    Filesize

    660B

    MD5

    e8e7b48f21d3aadd4c9f3bf3dcef614d

    SHA1

    5c77ddcc72d8a16281a84cca6270a8d78de780d9

    SHA256

    ef5b5275b9f12810932e196f2223f8920d32aa433f154f088d8149b84e76af50

    SHA512

    47e10f8a062248c8599f17572159666a04724ce9e63bc34c91c69fa082934547421aca940f37648c7392dc5ea8155561a689e3c93aabfb89dd172d031091abf7

  • C:\Users\Admin\AppData\Local\Temp\x2nyf07x.0.vb

    Filesize

    15KB

    MD5

    088eaeebc21710fb70be7e092a13933c

    SHA1

    58f89d36dd0a522c16463202a6f930ea6841f5c6

    SHA256

    1e04ca229ad36f476a00a5b7d1d681d5bca41e2bbbc8e1d593d726f1e6dff44d

    SHA512

    39b43af82f17eb4703fb82e2fa70f566e5cf181535c0df1bd2ee4e91892cf6ae8225c453f1a461870016a059d8d4866a21aaf59fa2c1a3e20c1479f24204d42d

  • C:\Users\Admin\AppData\Local\Temp\x2nyf07x.cmdline

    Filesize

    266B

    MD5

    98946842ff86b2d3187ada11bed13556

    SHA1

    9c8b2983bf0457bb65cbecb971dfc8be12cb9a25

    SHA256

    6cbe05cee8cf20674a7c0a6048b00be82ac0807a7a31cd08f84fba8d82a1b408

    SHA512

    4adb3299a1d0adb93dd38fd902172d6841a57034ccc913b943015f359d919ebcc3166f341cf200878fb596e6e78e7d4f65605ee9b92f4d6dc6d8e65bb508b1b9

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • \Users\Admin\AppData\Local\Temp\tmpEBA6.tmp.exe

    Filesize

    78KB

    MD5

    5718ea067d80822f5d14c1c7434a8a67

    SHA1

    7e9a0bc4d63f469de836e40cf472d9c7e52a6bab

    SHA256

    5ff4eeded140081ccfc797534c1f10402ad316b6d61ae120e4c69245d8b3f94e

    SHA512

    6e33fe09a1155e1803fa61d1ab124b3941f9fa578fb8f78754fae233a5a12e6be872d0af07eec0a6d7108f7f6b121cb62e8726f1bbc4e045f46b992f8b8161f1

  • memory/2692-0-0x0000000074A21000-0x0000000074A22000-memory.dmp

    Filesize

    4KB

  • memory/2692-1-0x0000000074A20000-0x0000000074FCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2692-2-0x0000000074A20000-0x0000000074FCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2692-24-0x0000000074A20000-0x0000000074FCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-8-0x0000000074A20000-0x0000000074FCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-18-0x0000000074A20000-0x0000000074FCB000-memory.dmp

    Filesize

    5.7MB