Overview
overview
10Static
static
10de1299d65e...07.exe
windows7-x64
10de1299d65e...07.exe
windows10-2004-x64
10de3206bd13...8d.exe
windows7-x64
8de3206bd13...8d.exe
windows10-2004-x64
8de41dac906...f2.exe
windows7-x64
10de41dac906...f2.exe
windows10-2004-x64
10de55ad6fba...fe.exe
windows7-x64
10de55ad6fba...fe.exe
windows10-2004-x64
10de7c6ded50...6f.exe
windows7-x64
10de7c6ded50...6f.exe
windows10-2004-x64
10de85b03beb...f7.exe
windows7-x64
10de85b03beb...f7.exe
windows10-2004-x64
10de8984199c...45.exe
windows7-x64
10de8984199c...45.exe
windows10-2004-x64
10deb9b3528e...91.exe
windows7-x64
10deb9b3528e...91.exe
windows10-2004-x64
10dec0fc30b5...d0.exe
windows7-x64
10dec0fc30b5...d0.exe
windows10-2004-x64
10ded424937a...b5.exe
windows7-x64
10ded424937a...b5.exe
windows10-2004-x64
10defcdae3dc...64.exe
windows7-x64
10defcdae3dc...64.exe
windows10-2004-x64
10df04d21f8f...1c.exe
windows7-x64
10df04d21f8f...1c.exe
windows10-2004-x64
10df0e554958...e9.exe
windows7-x64
7df0e554958...e9.exe
windows10-2004-x64
7df35e63228...2e.exe
windows7-x64
10df35e63228...2e.exe
windows10-2004-x64
10df43aaf53c...31.exe
windows7-x64
8df43aaf53c...31.exe
windows10-2004-x64
8df9cc0d83f...35.exe
windows7-x64
7df9cc0d83f...35.exe
windows10-2004-x64
7Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win10v2004-20250314-en
General
-
Target
de1299d65e55eeb63ddc8320cafe3f07.exe
-
Size
78KB
-
MD5
de1299d65e55eeb63ddc8320cafe3f07
-
SHA1
7a129ef919232a00a650bd6ac1747f693e1bce28
-
SHA256
7548e1cfe2b627de637b2b91f493b408869a283f04151b182e2c74b20f7932e1
-
SHA512
2b171c392a84a42e2f83e20a00a14998758dba76c814de8b28814bf2b84a8b9843a262effc74ec3a67167443083a8be2e0972d85874ed2ab68b5e99fe65d223d
-
SSDEEP
1536:URWV5gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQty6i9/u1e9:URWV5vn7N041Qqhg69/Z
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation de1299d65e55eeb63ddc8320cafe3f07.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 tmp6BAA.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp6BAA.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp6BAA.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de1299d65e55eeb63ddc8320cafe3f07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1428 de1299d65e55eeb63ddc8320cafe3f07.exe Token: SeDebugPrivilege 1636 tmp6BAA.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1772 1428 de1299d65e55eeb63ddc8320cafe3f07.exe 88 PID 1428 wrote to memory of 1772 1428 de1299d65e55eeb63ddc8320cafe3f07.exe 88 PID 1428 wrote to memory of 1772 1428 de1299d65e55eeb63ddc8320cafe3f07.exe 88 PID 1772 wrote to memory of 3180 1772 vbc.exe 90 PID 1772 wrote to memory of 3180 1772 vbc.exe 90 PID 1772 wrote to memory of 3180 1772 vbc.exe 90 PID 1428 wrote to memory of 1636 1428 de1299d65e55eeb63ddc8320cafe3f07.exe 91 PID 1428 wrote to memory of 1636 1428 de1299d65e55eeb63ddc8320cafe3f07.exe 91 PID 1428 wrote to memory of 1636 1428 de1299d65e55eeb63ddc8320cafe3f07.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\de1299d65e55eeb63ddc8320cafe3f07.exe"C:\Users\Admin\AppData\Local\Temp\de1299d65e55eeb63ddc8320cafe3f07.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qw4epk0a.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C85.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc10B2274529964AE3BE0A47F49982BD3.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3180
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp6BAA.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6BAA.tmp.exe" C:\Users\Admin\AppData\Local\Temp\de1299d65e55eeb63ddc8320cafe3f07.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aadd403ae8549b2125ef8e7fb274b501
SHA1e21e2868c3971cc7d4ecac8bd72b364ad77769a1
SHA2564af6c8a6f1ad55bbf62326b6637cea5c7aee028cfc2272ea1efa9933430dab53
SHA512ff00892b3f5eaba1c0941ad54c48b8c41fa55dd134e3e43bccb9abd8d6bc13b7e68ac1c3230b3dd08534e225f7e4db9ce5dcb5a639940fc72a8747b3dc43daa3
-
Filesize
14KB
MD5737675ee02add657d4e8abe43856e05d
SHA15a3ebd75739ca0a7dc5b0c12264e40bce206fd5b
SHA256dee9d9a09cb5bb3ae4ebca76f1c67ae1828dc5f65f28a647586a01b613359ffd
SHA512877a7c5608d1031d405c4e39cdffbe71c742251557f483ce4cf1bbe96e4c35c53d5523d7f953e922629dbdcf8df2da98c8e3cd611270b0a871322e4078c3f0b3
-
Filesize
266B
MD5e416489a7c04e4c8a215e51459e03a84
SHA1160dc903d61abdad1077bf269e05f89271501dc3
SHA256ad09f8b079a2ccd52b5bed1ff2dc6a9cb943e86d7094572246b9f6002e12cf8d
SHA5126523f791b784519fed25363d571cf003a6c642600403d672c9d89a99ecffdfe4186daaf8b2783433da1661454131e684581db5b30655bd45e040c0ddd259d761
-
Filesize
78KB
MD50ec237caf9e62e61bd978a55e2366d5e
SHA12776884eb245fc4534eca60f638bab090a09bf14
SHA2563ead0cca49967ec1aa6ae8d7af79928585e18f9e43fabe3b30784c9a3ead3297
SHA512f370aebe7c00d92da7b319ddc1cd9a2beab267165cca917088d8986525c798e8bedf00657e2383c2e7664a6fcb6958fd5447d59a28a948a55407a01400488377
-
Filesize
660B
MD57f95c37fe5f6fbf9cc16e75fb9ddb27a
SHA163ac3644c89f20a03237a833ba08092f3b0212b2
SHA2567fb8e6da1fe4255e9e557a939dd73f175e1ba24f079d97c32e351faec6a9da98
SHA51251bd008c2522d05ee13ea7707791acfb7d595ad858c2b7b825d81d3c61a01942e745fc1d7b4b6e8eb644af7f4f524fa233da027f83adffa5825347d7b2bd7c5c
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65