Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2025, 00:13

General

  • Target

    tmp1EF5.tmp.exe

  • Size

    78KB

  • MD5

    218002d4494871551c3fd0f066c24863

  • SHA1

    b795f81b31b18c18ebf64750211ffe62f9ac12a9

  • SHA256

    3d98b01a737ff423a51d2b4c9569febaaea5071609b7bb732c7e4ba39b132ea2

  • SHA512

    05e115dd568b63d3f15802f576853b3e9f557a4dea1d80793fbbaf39270de8b015a01a0fbbbed7de115f8d4ee14f1855eea36839d1433f650a8b1b2a2d79769a

  • SSDEEP

    1536:FsHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtJ9/a1W5:FsHFo53Ln7N041QqhgJ9/l

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp1EF5.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp1EF5.tmp.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5156
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iwotyvmf.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA1AE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6ED1BB60F1DE48BDA2BB6FC1DF4B2614.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5940
    • C:\Users\Admin\AppData\Local\Temp\tmpA095.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA095.tmp.exe" C:\Users\Admin\AppData\Local\Temp\tmp1EF5.tmp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA1AE.tmp

    Filesize

    1KB

    MD5

    ba9984ca91716f882514f2059cc93126

    SHA1

    624c8e078a769f0f75a7c51989607e720ba62d4e

    SHA256

    8a39b168bfc879e37685a0c7a761e7b0e4f4e399079b00f4bb858977275f85a1

    SHA512

    8105425ac88dfbfc64cced2b20f781a36aa5b6d96baf4ac34f656ee7c073eabd168a1954ebda7d24450208106418b7ffc2f0b94b6143922ac3d45180db99b3bd

  • C:\Users\Admin\AppData\Local\Temp\iwotyvmf.0.vb

    Filesize

    15KB

    MD5

    9765658807707970614f8edc030b0cca

    SHA1

    fad298bac2a7856530f62844c2d888f6c044d509

    SHA256

    9f3a586970944a6e2f8779af7b832dc21f3800367dfc74a906039cacabeb5b57

    SHA512

    94e18529454964ecb94b1203a82ab1a2913f80ee2b810fe78105605c6d350d0377b2c74faa54bca6c0147b9c266624bb38449abc9a431f13fc0b9d0cd04b3b2e

  • C:\Users\Admin\AppData\Local\Temp\iwotyvmf.cmdline

    Filesize

    266B

    MD5

    e48faa2582cc48816093c628b8891f51

    SHA1

    b54aa42209f9b4920a3a65b2c1e7b762f35cb080

    SHA256

    21b70047c7cf28ba467ffc35e53d1b89f6b1269fa6a3eb1fa9476ed123d249c2

    SHA512

    7c7a534cdb103e6485db53f8f3f2c3f95980c75e87a6dd3da1d9a4b44354d0e8e5912019d13151e54321aa06a5fc889ae9aecdb4890036d1a75959efde2bf4d6

  • C:\Users\Admin\AppData\Local\Temp\tmpA095.tmp.exe

    Filesize

    78KB

    MD5

    024bd2b3fb77c530fae44c543e6e5d95

    SHA1

    acd9b69860cafa0bcdb5e709928aca48f4e97b75

    SHA256

    c578e98b2401143ce45088d28c8d31be7ef589e15c1a1b2245067ee30bfb11dd

    SHA512

    6f5d9925a88bbea4ff42977353076609f8599a2be5fdf54b8cece7c406d2b745445bd857b10f87ab351c08d85bd1b96e51abbfbc6ff7b583000f08da8628a347

  • C:\Users\Admin\AppData\Local\Temp\vbc6ED1BB60F1DE48BDA2BB6FC1DF4B2614.TMP

    Filesize

    660B

    MD5

    3901438f3aa13fe7e15914d0cfd4ce96

    SHA1

    43a18f20adba55c6f0e1940260c9cd5dcfc19364

    SHA256

    968d4cd0807ceab8b787bc85e2e636c41c48bc6ad1bf850a252b7db31d61be2b

    SHA512

    acd74c9b730b5f18dd051f5f5f22faacbe92eff01a7b3fdaf2307e035cb67cc84b5760f70288924a2c0acae1fdc8d9371c43c0e50edfc8e475636b7c4ab6afa0

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2672-9-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/2672-18-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5156-2-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5156-0-0x00000000747E2000-0x00000000747E3000-memory.dmp

    Filesize

    4KB

  • memory/5156-1-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5156-22-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5964-23-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5964-24-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5964-26-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5964-27-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB

  • memory/5964-28-0x00000000747E0000-0x0000000074D91000-memory.dmp

    Filesize

    5.7MB