Analysis

  • max time kernel
    148s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    eebe0a35fa5791aae284e3ecd38c0682.exe

  • Size

    78KB

  • MD5

    eebe0a35fa5791aae284e3ecd38c0682

  • SHA1

    00a64541958a45c40879da39e74a25fb87635bdb

  • SHA256

    be7fb2fc4c7be245699e0ee777015cd584fb02dd1cbbea9d477d74307dee0f41

  • SHA512

    227fc9f348fd349b30565f196b7e79977be3995a630c723be85bfe31742a57d4a661b621e401302d422e0955f05283388487be08d2849f99651395c148e5dc5a

  • SSDEEP

    1536:8Py58/dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN66t9/C1bq:8Py58en7N041Qqhgpt9/t

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eebe0a35fa5791aae284e3ecd38c0682.exe
    "C:\Users\Admin\AppData\Local\Temp\eebe0a35fa5791aae284e3ecd38c0682.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\niirdrhl.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2EAF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2E9F.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2368
    • C:\Users\Admin\AppData\Local\Temp\tmp2C9C.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp2C9C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\eebe0a35fa5791aae284e3ecd38c0682.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES2EAF.tmp

    Filesize

    1KB

    MD5

    e6885382e9301773e1f4880078124791

    SHA1

    a499ae1beac136c4ef3d208d03eae90da6d0c749

    SHA256

    590ec82b903e65c5076f2e878a33819db7600c440ffe687d7abd5362ec675516

    SHA512

    3a5b2c4e7058ee56d658596e1b44ff6c38dcaf8ca92a8ef153aa394fef692449756b21bd25a90876dba96854ce2d6170c549f5d89f937ffd19719ccaf6d18fd0

  • C:\Users\Admin\AppData\Local\Temp\niirdrhl.0.vb

    Filesize

    14KB

    MD5

    b553f4a9ac364ae8630288dd34a21e40

    SHA1

    c10fdc7a634fe34c6c682e95f5bd88a8bff0e5e5

    SHA256

    972e4bb37a60cd9fd012409601d3770176050c4f759b16823daf086c99b39e5f

    SHA512

    de0fca0d860dd77783cf1e4ea389d04e125f1665088d4233b70cc37611f10db26177f819fa29190bc943d11d53450b9127da686732c625b0d2ec96b44b211932

  • C:\Users\Admin\AppData\Local\Temp\niirdrhl.cmdline

    Filesize

    266B

    MD5

    e0475b27bcc2e1827d2c9e5a08479fea

    SHA1

    733c69273b860b7efd182568c77f2a9f9abd5d99

    SHA256

    de2fb2600a8723843931f6992d08f7df3e1320cfcbb60a375b05161b807cb918

    SHA512

    59db30ef7f93d5570c61018abf1da67c032d6c9a49cf48c19142948adf1bfb32e3bb4ca48c9cf26af67f40d1eb48f7d3ddc149f34ba8c80d1822ba4ac944b1de

  • C:\Users\Admin\AppData\Local\Temp\tmp2C9C.tmp.exe

    Filesize

    78KB

    MD5

    96e3b4c51fdde9265034d59943f8d17b

    SHA1

    5178b93f479b69258d1bff36312f3b3d730f4a69

    SHA256

    01f37e58a9ce81eb2627978cb2dc18abb8bd6a03cea1eb7012f1ded8d3baac80

    SHA512

    8aadb51f3b093060f3962caefda13a7c9272c5314ae4edb9aaeec638989f63e5ebcb0ddae3c40a5eb7cb564f61be706c304e54facdbb5ccfad623406d505cf61

  • C:\Users\Admin\AppData\Local\Temp\vbc2E9F.tmp

    Filesize

    660B

    MD5

    d0a93a80e52959e366d903983ed5f72c

    SHA1

    796b74770bc15b408f050e5b944872ec91048819

    SHA256

    ae7d1aff1c8ecdc78975a9eea82a5d37a34c04c597843d52a02fc762a6246ffd

    SHA512

    e0d8c2c506c5870965107bc33a7798f4ca192306c57ee30d3d2e3d7e4c8fb2e901594d3cb8c54e3cc8d4ca566f47f040bc598607d10767c427258ddbe116f58d

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1764-0-0x0000000074591000-0x0000000074592000-memory.dmp

    Filesize

    4KB

  • memory/1764-1-0x0000000074590000-0x0000000074B3B000-memory.dmp

    Filesize

    5.7MB

  • memory/1764-2-0x0000000074590000-0x0000000074B3B000-memory.dmp

    Filesize

    5.7MB

  • memory/1764-24-0x0000000074590000-0x0000000074B3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2300-8-0x0000000074590000-0x0000000074B3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2300-18-0x0000000074590000-0x0000000074B3B000-memory.dmp

    Filesize

    5.7MB