Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:12

General

  • Target

    736e4ed2299f5ec127d8f98265dc5a93.exe

  • Size

    78KB

  • MD5

    736e4ed2299f5ec127d8f98265dc5a93

  • SHA1

    2874662d53902e4712fba6e70eb57b4989ad581a

  • SHA256

    29f4e4c8d63c893a79a2136b7bd550e446d53f0f3295d686af51798bf1f985dd

  • SHA512

    886db800a10586d6142f6d6cdbb64fb22109c65a42fe2c13b54cf96d3f5d777224deb1e9dfc94232ec25a4d63ceb741f2a973831231064fab2e16b46273f7068

  • SSDEEP

    1536:gHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtu9/p1X/:gHFo53Ln7N041Qqhgu9/j

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\736e4ed2299f5ec127d8f98265dc5a93.exe
    "C:\Users\Admin\AppData\Local\Temp\736e4ed2299f5ec127d8f98265dc5a93.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vlgggorb.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBDD2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4ADC2AD5E308402B8CB6975E1FFD8694.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1832
    • C:\Users\Admin\AppData\Local\Temp\tmpBCD8.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpBCD8.tmp.exe" C:\Users\Admin\AppData\Local\Temp\736e4ed2299f5ec127d8f98265dc5a93.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESBDD2.tmp

    Filesize

    1KB

    MD5

    51e0593f42a4251ccfb8e68f718782e7

    SHA1

    b37a081b8af00d6ca9447b36c2f13f7f0b4e63f9

    SHA256

    4154d757afb7ebf7175e281c907e3a4b73869b797c4b4e25096e14ee3be6186b

    SHA512

    c88c3260f1be3fe89fee3cee832f2b7f081046800d7a6b64998fa230aa4aea37b2002c410720ac839d49feba832ac16b25a5f79ad8536a125dba7558aba9075c

  • C:\Users\Admin\AppData\Local\Temp\tmpBCD8.tmp.exe

    Filesize

    78KB

    MD5

    6779ce4720be5e9bd5c56024868a6431

    SHA1

    c226ecc4147c27180897e35cc832fbe8d6c5c571

    SHA256

    269b0ec2d8beef0b831afb380e0496e50111bb71c47f6c7a6bc2f69633b0c813

    SHA512

    f7e3f7ecd80842940dfc7ecf6dc75fd919f30829783d985fc00ad6f8b136267b07e4d994b96e99647eb818c9cff5f2bc5fb1a5cc9142403e368cc6e6f7f2bc8d

  • C:\Users\Admin\AppData\Local\Temp\vbc4ADC2AD5E308402B8CB6975E1FFD8694.TMP

    Filesize

    660B

    MD5

    95cd46f8d7c2f77fb6492425c0b796ea

    SHA1

    b73cd7ef29e0cda5f2a78640c537849929f02c3d

    SHA256

    251dc265200727616e0c6810713f3bc4b3e4bbce344d502f4aa5b300ad14da36

    SHA512

    1c552440a65b9902002c92d4340327a4f567322a26ec19cb7fdb903ab8ff8b853c4d4f67d1ca0c1c66183154e1797788f71fef47a86ed4e84c63ec68f0704e5a

  • C:\Users\Admin\AppData\Local\Temp\vlgggorb.0.vb

    Filesize

    15KB

    MD5

    e833efad5ca8b60b9ce96dc5941aa80a

    SHA1

    839bf2c9ffa333292e7e680a282ef8d03bcddb6f

    SHA256

    72e4ce18128d08e3c87e1afd3659d5ed8f9bcf372723f2500550182d26503c3b

    SHA512

    957a7e8207e4a25212988d34e590ab9f53d6d26dbc372d6963482a268b95d53af1cae9251e696ec13cc26a4bccdcd5a225a9f8fbb364e7497b3abd27e97b754c

  • C:\Users\Admin\AppData\Local\Temp\vlgggorb.cmdline

    Filesize

    266B

    MD5

    0c202052a1037b5ae93960df31316621

    SHA1

    44bdc7e249ed11ec388088dc1afd957bfad8d48c

    SHA256

    3a0773a7e223ef1f8f1d7a53b85b3fa2e4cc004b7567cefaab607faa603aff00

    SHA512

    037e3870ae54a64eb7f704db578d075bf5eb1ac23e9df2e1582cfe163ee640fb421d664555e726ae8891d21c27779546215ba226a42104df0175b6ff4989aa39

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1952-1-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/1952-2-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/1952-0-0x0000000075372000-0x0000000075373000-memory.dmp

    Filesize

    4KB

  • memory/1952-22-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/1996-9-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/1996-18-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/4908-23-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/4908-24-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/4908-26-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/4908-27-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/4908-28-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB