Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:11

General

  • Target

    64d77182d5d559f24eac8d7dc728bb9a.exe

  • Size

    78KB

  • MD5

    64d77182d5d559f24eac8d7dc728bb9a

  • SHA1

    80d3c4c71adfb2a675b2322d4fad6122c4c0ff11

  • SHA256

    93cddead5db08cea0170a9ab0cab8cab6dadce110c8e0b2a013c050a0b4a818b

  • SHA512

    24e3982c0b1928c2641d92fe22cbe4ead35aff1e547b949901cceb45e48f12e29fb8903cb20e3077fbcf87f4e322456a651b3e5a3a204e0cdf8ca66417cb11ac

  • SSDEEP

    1536:esHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtx9/61Jj:esHY53Ln7N041Qqhgx9/q

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64d77182d5d559f24eac8d7dc728bb9a.exe
    "C:\Users\Admin\AppData\Local\Temp\64d77182d5d559f24eac8d7dc728bb9a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3lmvbbv_.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA47A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA479.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1148
    • C:\Users\Admin\AppData\Local\Temp\tmpA361.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA361.tmp.exe" C:\Users\Admin\AppData\Local\Temp\64d77182d5d559f24eac8d7dc728bb9a.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3lmvbbv_.0.vb

    Filesize

    15KB

    MD5

    47bc00ef240a1df8d0e2794ade14bbe3

    SHA1

    547e31c788d8fccffce67dc9ba6770ea537d19e4

    SHA256

    4b15c67f0b799e2be54d32e5e36a0cc2b0c7977aed59198fd7ef6df17d2a6a56

    SHA512

    4a77bda12081559ab3702080a2b9d9a3afd058b1968cabdab8ed7263b4dd79d7c4e59dce661cb3ac339d323f2f5aed308d76a16269c6a7709e7ba8cda2611493

  • C:\Users\Admin\AppData\Local\Temp\3lmvbbv_.cmdline

    Filesize

    266B

    MD5

    b710120f86e1340f7d44a016574139d4

    SHA1

    c75806968137076c446e3bf78f68695379fc0682

    SHA256

    b9574a40d5994514830015a70a68350502ce981d9d485154356d70082d0fbc9c

    SHA512

    6d5f697bdcf10770d5a73a72056234b96b0a1f7d4c2624abe34bb23b8f291ea9b153b2440d0a3cf9ea413d4aea5e09d79656824437a8fcd1311ee274ab3da223

  • C:\Users\Admin\AppData\Local\Temp\RESA47A.tmp

    Filesize

    1KB

    MD5

    9b789ffa9b4330001102ae292fb6dcc6

    SHA1

    b9a010c54bbd9a901c8790aaeb0c1d057b9b25b1

    SHA256

    813941d44d9a2f65a417875ab45dd344372767242bff1486e2d5aad608afffe7

    SHA512

    654923a3c51211e33a7789ab6146399070d7d7c5b0023929c9af924930af6ae35a2d13a1200f958371aba0c2a04a4c02628028b8f8092295ec1b34d3def7b099

  • C:\Users\Admin\AppData\Local\Temp\tmpA361.tmp.exe

    Filesize

    78KB

    MD5

    edf50f584e57a63c10aa0fbb8ebc6b7d

    SHA1

    1a76ecdea59a61fa50ce91f79d1afe41f950d67b

    SHA256

    d0743f5c768f5b8969bb31bb97a317102e45eda6a22841812783cab4e92e5da5

    SHA512

    619ad2bdf1f9d34ef8a433ab3f20df87f3ba77e8719aff27bf8e32cd917cffbd6d315f4aec091526094f3ff7a72a94c94b16b4af58105983d482706d8d4955d1

  • C:\Users\Admin\AppData\Local\Temp\vbcA479.tmp

    Filesize

    660B

    MD5

    392429fa6e7e9a09e6d54ea164a73fc9

    SHA1

    0e56183fcb7d9ddce115a4fbbdcf79ac1347e71c

    SHA256

    a0ebec8fa8f942289f742559229644a3c66ae35183675dcecf4ddbcacd898d6d

    SHA512

    85f836269c66041d234bbcae83ec199060aef19c6feb38089730bd48ad5edfc02ba7362f24aad927b1c373d90167fdf59ea1b339000af8caa04456c8e7ad833b

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1620-0-0x0000000074531000-0x0000000074532000-memory.dmp

    Filesize

    4KB

  • memory/1620-1-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/1620-2-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/1620-24-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/1624-8-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/1624-18-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB