Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:15

General

  • Target

    b1be021a241291568911ceeb4c50d4db.exe

  • Size

    78KB

  • MD5

    b1be021a241291568911ceeb4c50d4db

  • SHA1

    09745bff096e30f3f85fbfdbc32b405391f3af25

  • SHA256

    a5b5c9778aead01cd31a0726a8c5f167ebb4882ab391bb615a0c3a1039546a03

  • SHA512

    49c4cc40205dfcd89a958c54110b336eacd48454bcb915ebd60a1b9f07c415cb4604c8d67a4d8811c6829ed8c11d85cc15fd9de3afa5a1f088c53cce955c1b88

  • SSDEEP

    1536:aRWV5jMdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6N9/gj1Un:aRWV5j7n7N041Qqhg19/x

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1be021a241291568911ceeb4c50d4db.exe
    "C:\Users\Admin\AppData\Local\Temp\b1be021a241291568911ceeb4c50d4db.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rljkcivw.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD173.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD172.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2660
    • C:\Users\Admin\AppData\Local\Temp\tmpD0C7.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD0C7.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b1be021a241291568911ceeb4c50d4db.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD173.tmp

    Filesize

    1KB

    MD5

    5d25946936a7fa5fff0636948590f1f9

    SHA1

    e753490b2342f7935f1a69e2c395f809e2175c2c

    SHA256

    1ad2d0ef19889bf695fd3ce17504e6097f5c2f80223bd1bc6924e66df05d1dbc

    SHA512

    e2f40bb96e514104165e1cf8e9b3e7c96fde829cebe480b621520220cb1b8ad74198ee7e628422e4d6e2e9abeb1111c791c06a36525fc5c669d637d216bcfcac

  • C:\Users\Admin\AppData\Local\Temp\rljkcivw.0.vb

    Filesize

    14KB

    MD5

    e05259ef8f77cb3670ef6b4a1e973f88

    SHA1

    d97f10879418bd9d195d60aa33fec9814d3694db

    SHA256

    c42cfc982300b90d277fee3f3f20d3b472333f666f94dec1de2df79a4ac16edc

    SHA512

    cb970a5b9e040cf48c7b615713302cb8194ff48bed756595e0795b4847a60cff98ca9668fdac2d3f90fc6deeb170b10ac7a370da85c72f1d87000be25f7bd9c2

  • C:\Users\Admin\AppData\Local\Temp\rljkcivw.cmdline

    Filesize

    266B

    MD5

    2b712a6b3b5cb2647163421c1ebea9ba

    SHA1

    49a6a296a187a5e28e3bd977091cbbcc3eac3dd1

    SHA256

    4723657c0cfcfebc533b0bb59e719616d22ac9ffb66ec773db6ab8cc46252eb8

    SHA512

    ec1c46b97a803e89cececfb5e4ca0b8bcde501f0d100e28eeccf5791a367398af125df672e59f0c4a106ae14f0ab7b78e6f8455f5922e9762c4eecfa2c2ccd6c

  • C:\Users\Admin\AppData\Local\Temp\tmpD0C7.tmp.exe

    Filesize

    78KB

    MD5

    a3fc98c9a889e0048720fea3b37bb606

    SHA1

    9276e6c636bb38508150d3b20f05fbb7c8295d2f

    SHA256

    1eb6752b04d70251d71f607a95444dac47620cbe8e6be8dd3c9073a3b66dd652

    SHA512

    3c34384bab19fc6a224bd4d44f416381d991c1a268f8890ba20c234c0a12d8afef9b90c1e530146ce20240cf12ae3bb7b7764c2f24ce4bfa5d008892ee119665

  • C:\Users\Admin\AppData\Local\Temp\vbcD172.tmp

    Filesize

    660B

    MD5

    c768d80eb032f51aeda21b0c60c27d70

    SHA1

    69fa897ea695f61ff1d846a18634cd8f72a92ece

    SHA256

    049af5a5345386067f87231faa0c714e542d386d8ab440f4a46d670d11b02910

    SHA512

    a67d4ea7b3124f355ff1483a6f95dd1c67c018c4de9e8d49def91d0cadd388d65dd9543d0b5bb8a354b1d854f6454598f6f54c0f99d5a8e9dd257373a247efec

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/836-8-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/836-18-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2392-0-0x00000000747D1000-0x00000000747D2000-memory.dmp

    Filesize

    4KB

  • memory/2392-1-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2392-2-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2392-24-0x00000000747D0000-0x0000000074D7B000-memory.dmp

    Filesize

    5.7MB