Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    eebe0a35fa5791aae284e3ecd38c0682.exe

  • Size

    78KB

  • MD5

    eebe0a35fa5791aae284e3ecd38c0682

  • SHA1

    00a64541958a45c40879da39e74a25fb87635bdb

  • SHA256

    be7fb2fc4c7be245699e0ee777015cd584fb02dd1cbbea9d477d74307dee0f41

  • SHA512

    227fc9f348fd349b30565f196b7e79977be3995a630c723be85bfe31742a57d4a661b621e401302d422e0955f05283388487be08d2849f99651395c148e5dc5a

  • SSDEEP

    1536:8Py58/dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN66t9/C1bq:8Py58en7N041Qqhgpt9/t

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eebe0a35fa5791aae284e3ecd38c0682.exe
    "C:\Users\Admin\AppData\Local\Temp\eebe0a35fa5791aae284e3ecd38c0682.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ynem40tq.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4026.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFCF311F674EB4854A0F0776E822E688F.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4468
    • C:\Users\Admin\AppData\Local\Temp\tmp3F7A.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3F7A.tmp.exe" C:\Users\Admin\AppData\Local\Temp\eebe0a35fa5791aae284e3ecd38c0682.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES4026.tmp

    Filesize

    1KB

    MD5

    149d32a83706fb34cc88977e120a3c06

    SHA1

    c683d271b6ec1fd71fcc397a2186419e778cbaad

    SHA256

    68ac4b9f9cdf9e5467acb86fe4440e107fb9135daf949eeafb91fc71ed18a62e

    SHA512

    6335b4da9ab80369f51742a73ec74e5fd956ce090a915dbdcc6ad155ba8141589b9e049342b8ce4abf76ff10b90bdc2475cc060f7bc5766f70a3242132f2306b

  • C:\Users\Admin\AppData\Local\Temp\tmp3F7A.tmp.exe

    Filesize

    78KB

    MD5

    e837bcafe265478f6f0580217a851a2c

    SHA1

    f261791310c7be569cbc25686cedeb503f7d42ed

    SHA256

    e3a9ee56006ac2f5052f4a1a8f6c363532c3bb7454c334a6857073d76912a07f

    SHA512

    904dc41ae91b679235fd5c5ac00287d831e23e3083634a11d441a2717d306b5f6154f9a850275a7d34a14edcb6f7bd24c279b0b76703a3ef3b875ae12dacdc0a

  • C:\Users\Admin\AppData\Local\Temp\vbcFCF311F674EB4854A0F0776E822E688F.TMP

    Filesize

    660B

    MD5

    8e66be2a4c6e691bba0ba9b8fa532016

    SHA1

    7d89c648c6cff8ea3da18dbce85f478f8d572b9c

    SHA256

    8d43ef9a6dc50ebe1c40417f12c1347bd7a8c5c157f8e0b6735949cd7258f66b

    SHA512

    2816798634f63cf40a9da9ba8975080c74d3aba6ab4a66add6359bedffc4f8946c93bdca8a40557504daf1b6de5c4cae2ebc2095891ca75bdb850144667fe0a5

  • C:\Users\Admin\AppData\Local\Temp\ynem40tq.0.vb

    Filesize

    14KB

    MD5

    e68e61f818cc258feccb1b578764a0bf

    SHA1

    d7d0917bc343c32ade7416afa30e8eff8b64bfdb

    SHA256

    afabfee6ed4cd4c28578ba350c02ae6743a8e04176fbcbaead442ffcaa59f629

    SHA512

    4e156a34d4a99062c556a0269a7099bf2da3e839e7e550478a67ebd27fc6442dcdf15f558e08275880c2a3c0b74f8bd373a76b67f7d6fd38070842604c024034

  • C:\Users\Admin\AppData\Local\Temp\ynem40tq.cmdline

    Filesize

    266B

    MD5

    70e26a4cb20d217f1b2b24e674c3758b

    SHA1

    5637ca1edbd005b310a8329954862dcbc01d01b7

    SHA256

    37fb6b81f8dd068de3ee476246f1b79745477ad45fe0a399af44a46cb0ce0c9b

    SHA512

    e92a35ba8743a3e32bcd497f1666e680efb4d8a8f9ae8fa622293fdc4e290495985823f51f07d7958914bc2c8163aa557bbbe653b2459a31e492038c97679b45

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2676-22-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/2676-0-0x0000000074BC2000-0x0000000074BC3000-memory.dmp

    Filesize

    4KB

  • memory/2676-2-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/2676-1-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4384-24-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4384-23-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4384-25-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4384-27-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4384-28-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4384-29-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4736-18-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/4736-9-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB