Analysis

  • max time kernel
    146s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:15

General

  • Target

    b0a1fdb84b6401a5471152ae215350fb.exe

  • Size

    78KB

  • MD5

    b0a1fdb84b6401a5471152ae215350fb

  • SHA1

    fc1abcf7b7025ccfa1dde201a678ec9cf63d4f96

  • SHA256

    e6b1b5ede89edb671aa3939086b30bf020dbcb5e34ec2bc21f043cc8263fa355

  • SHA512

    95ebc5c35acbe095f9fa680594cdc89ce6cc328b7a4842dd599b8dade967f6fd2de16c84479f5d4e465e509f8b4635b68bb6b5c73dd4010d77c1ffa012158031

  • SSDEEP

    1536:TRWV5jSTdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6m9/J16X:TRWV5jSyn7N041Qqhgu9/Q

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0a1fdb84b6401a5471152ae215350fb.exe
    "C:\Users\Admin\AppData\Local\Temp\b0a1fdb84b6401a5471152ae215350fb.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\i6ly8aw0.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD49E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD49D.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1800
    • C:\Users\Admin\AppData\Local\Temp\tmpD191.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD191.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b0a1fdb84b6401a5471152ae215350fb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD49E.tmp

    Filesize

    1KB

    MD5

    0cb4220490472846817311def9d4e08a

    SHA1

    2c9688cc65457426fd1b1e55a5337013114e6e87

    SHA256

    46bb8d930989402235af1dbcffbbd5b16ca545a629d2101bcb818bc46728ca46

    SHA512

    4b5d1da7eb5959feea3aeeeedb1d967ac43167ace915fea6dee06cc500da2d0aad0cae23d3f04029dec0cc217f83cf7d76a3718cf6ed46dcca16acdda7e938d8

  • C:\Users\Admin\AppData\Local\Temp\i6ly8aw0.0.vb

    Filesize

    14KB

    MD5

    9d932765ad42b433c119a5744f34f67a

    SHA1

    09bf1f357d369c6f219c90b9470a01f5923e7e4a

    SHA256

    5a6c9d495d14ecda712d25d576500a27ff37c905e1cd4b957b0b47e5aeb84efc

    SHA512

    43f35f8b656d37f1d002d3bb38cc50058139eae8006c29e8f66774fba3128d50e95532229448e2c56819f46cc5c2b9fa0d70ca23c91ea350a36194cc646a3dc0

  • C:\Users\Admin\AppData\Local\Temp\i6ly8aw0.cmdline

    Filesize

    266B

    MD5

    75cc719fd6d897efb08d1be5aa3056e0

    SHA1

    e47c6e848615844fec02b47f587adcb87118919a

    SHA256

    cc514ca700d0503bf364a6eb3fc24e26fb2786967a14d21d1eacb848f609ddf7

    SHA512

    acdf240545c4fcd3816e0883957e2ec47bd46532277a3ffa79ef0b59a2a55f2498fbb784c7c5a2101778a9ee0f97d197ffd8cbf14ffe88e2e19f4664ec16e426

  • C:\Users\Admin\AppData\Local\Temp\tmpD191.tmp.exe

    Filesize

    78KB

    MD5

    eccce69cda2b6ad92cdea5517979af04

    SHA1

    bc6e7d991c7a2666d2c47a230d83b54e1d2d83ec

    SHA256

    029e2a704eab5fbf9d3eb530751b10dfcfae556877d45b6b76274164008a1d54

    SHA512

    853f4a2e50fd6dfc680768dbad9281c420ec9d02a91782aa4bef123f6c953f07f67e4f70083159e09fc847c7cfd6b1a7d82d4dbd4c6665eb97742e23781c44c5

  • C:\Users\Admin\AppData\Local\Temp\vbcD49D.tmp

    Filesize

    660B

    MD5

    5b86fcbdcbb608cbb0dd7d02a4c1f5ee

    SHA1

    10ebbba81bf44d7744a081848de57f7ce68b022c

    SHA256

    ff07c389b53ad3b18c108e4af43acb90acb8608f27ffa5afd2037282861b6ea0

    SHA512

    fc191baaf760218cac729757903e6aaede4f9f8e7092248989a91a68c52a3ae583e19fe2d74fdd3509afa8dc1e7368c72bedd01547a1cf0de6a1651ad5b6a42a

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2352-8-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2352-18-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-0-0x0000000074B31000-0x0000000074B32000-memory.dmp

    Filesize

    4KB

  • memory/2568-1-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-2-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-24-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB