Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:17

General

  • Target

    de1299d65e55eeb63ddc8320cafe3f07.exe

  • Size

    78KB

  • MD5

    de1299d65e55eeb63ddc8320cafe3f07

  • SHA1

    7a129ef919232a00a650bd6ac1747f693e1bce28

  • SHA256

    7548e1cfe2b627de637b2b91f493b408869a283f04151b182e2c74b20f7932e1

  • SHA512

    2b171c392a84a42e2f83e20a00a14998758dba76c814de8b28814bf2b84a8b9843a262effc74ec3a67167443083a8be2e0972d85874ed2ab68b5e99fe65d223d

  • SSDEEP

    1536:URWV5gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQty6i9/u1e9:URWV5vn7N041Qqhg69/Z

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de1299d65e55eeb63ddc8320cafe3f07.exe
    "C:\Users\Admin\AppData\Local\Temp\de1299d65e55eeb63ddc8320cafe3f07.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qw4epk0a.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C85.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc10B2274529964AE3BE0A47F49982BD3.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3180
    • C:\Users\Admin\AppData\Local\Temp\tmp6BAA.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp6BAA.tmp.exe" C:\Users\Admin\AppData\Local\Temp\de1299d65e55eeb63ddc8320cafe3f07.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES6C85.tmp

    Filesize

    1KB

    MD5

    aadd403ae8549b2125ef8e7fb274b501

    SHA1

    e21e2868c3971cc7d4ecac8bd72b364ad77769a1

    SHA256

    4af6c8a6f1ad55bbf62326b6637cea5c7aee028cfc2272ea1efa9933430dab53

    SHA512

    ff00892b3f5eaba1c0941ad54c48b8c41fa55dd134e3e43bccb9abd8d6bc13b7e68ac1c3230b3dd08534e225f7e4db9ce5dcb5a639940fc72a8747b3dc43daa3

  • C:\Users\Admin\AppData\Local\Temp\qw4epk0a.0.vb

    Filesize

    14KB

    MD5

    737675ee02add657d4e8abe43856e05d

    SHA1

    5a3ebd75739ca0a7dc5b0c12264e40bce206fd5b

    SHA256

    dee9d9a09cb5bb3ae4ebca76f1c67ae1828dc5f65f28a647586a01b613359ffd

    SHA512

    877a7c5608d1031d405c4e39cdffbe71c742251557f483ce4cf1bbe96e4c35c53d5523d7f953e922629dbdcf8df2da98c8e3cd611270b0a871322e4078c3f0b3

  • C:\Users\Admin\AppData\Local\Temp\qw4epk0a.cmdline

    Filesize

    266B

    MD5

    e416489a7c04e4c8a215e51459e03a84

    SHA1

    160dc903d61abdad1077bf269e05f89271501dc3

    SHA256

    ad09f8b079a2ccd52b5bed1ff2dc6a9cb943e86d7094572246b9f6002e12cf8d

    SHA512

    6523f791b784519fed25363d571cf003a6c642600403d672c9d89a99ecffdfe4186daaf8b2783433da1661454131e684581db5b30655bd45e040c0ddd259d761

  • C:\Users\Admin\AppData\Local\Temp\tmp6BAA.tmp.exe

    Filesize

    78KB

    MD5

    0ec237caf9e62e61bd978a55e2366d5e

    SHA1

    2776884eb245fc4534eca60f638bab090a09bf14

    SHA256

    3ead0cca49967ec1aa6ae8d7af79928585e18f9e43fabe3b30784c9a3ead3297

    SHA512

    f370aebe7c00d92da7b319ddc1cd9a2beab267165cca917088d8986525c798e8bedf00657e2383c2e7664a6fcb6958fd5447d59a28a948a55407a01400488377

  • C:\Users\Admin\AppData\Local\Temp\vbc10B2274529964AE3BE0A47F49982BD3.TMP

    Filesize

    660B

    MD5

    7f95c37fe5f6fbf9cc16e75fb9ddb27a

    SHA1

    63ac3644c89f20a03237a833ba08092f3b0212b2

    SHA256

    7fb8e6da1fe4255e9e557a939dd73f175e1ba24f079d97c32e351faec6a9da98

    SHA512

    51bd008c2522d05ee13ea7707791acfb7d595ad858c2b7b825d81d3c61a01942e745fc1d7b4b6e8eb644af7f4f524fa233da027f83adffa5825347d7b2bd7c5c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1428-22-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1428-0-0x0000000074BC2000-0x0000000074BC3000-memory.dmp

    Filesize

    4KB

  • memory/1428-1-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1428-2-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-24-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-23-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-25-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-27-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-28-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-29-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1772-18-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1772-8-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB