Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
tmp1EF5.tmp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tmp1EF5.tmp.exe
Resource
win10v2004-20250314-en
General
-
Target
tmp1EF5.tmp.exe
-
Size
78KB
-
MD5
218002d4494871551c3fd0f066c24863
-
SHA1
b795f81b31b18c18ebf64750211ffe62f9ac12a9
-
SHA256
3d98b01a737ff423a51d2b4c9569febaaea5071609b7bb732c7e4ba39b132ea2
-
SHA512
05e115dd568b63d3f15802f576853b3e9f557a4dea1d80793fbbaf39270de8b015a01a0fbbbed7de115f8d4ee14f1855eea36839d1433f650a8b1b2a2d79769a
-
SSDEEP
1536:FsHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtJ9/a1W5:FsHFo53Ln7N041QqhgJ9/l
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation tmp1EF5.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 5964 tmpA095.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpA095.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp1EF5.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA095.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5156 tmp1EF5.tmp.exe Token: SeDebugPrivilege 5964 tmpA095.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5156 wrote to memory of 2672 5156 tmp1EF5.tmp.exe 87 PID 5156 wrote to memory of 2672 5156 tmp1EF5.tmp.exe 87 PID 5156 wrote to memory of 2672 5156 tmp1EF5.tmp.exe 87 PID 2672 wrote to memory of 5940 2672 vbc.exe 90 PID 2672 wrote to memory of 5940 2672 vbc.exe 90 PID 2672 wrote to memory of 5940 2672 vbc.exe 90 PID 5156 wrote to memory of 5964 5156 tmp1EF5.tmp.exe 92 PID 5156 wrote to memory of 5964 5156 tmp1EF5.tmp.exe 92 PID 5156 wrote to memory of 5964 5156 tmp1EF5.tmp.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp1EF5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1EF5.tmp.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5156 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iwotyvmf.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA1AE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6ED1BB60F1DE48BDA2BB6FC1DF4B2614.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA095.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA095.tmp.exe" C:\Users\Admin\AppData\Local\Temp\tmp1EF5.tmp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ba9984ca91716f882514f2059cc93126
SHA1624c8e078a769f0f75a7c51989607e720ba62d4e
SHA2568a39b168bfc879e37685a0c7a761e7b0e4f4e399079b00f4bb858977275f85a1
SHA5128105425ac88dfbfc64cced2b20f781a36aa5b6d96baf4ac34f656ee7c073eabd168a1954ebda7d24450208106418b7ffc2f0b94b6143922ac3d45180db99b3bd
-
Filesize
15KB
MD59765658807707970614f8edc030b0cca
SHA1fad298bac2a7856530f62844c2d888f6c044d509
SHA2569f3a586970944a6e2f8779af7b832dc21f3800367dfc74a906039cacabeb5b57
SHA51294e18529454964ecb94b1203a82ab1a2913f80ee2b810fe78105605c6d350d0377b2c74faa54bca6c0147b9c266624bb38449abc9a431f13fc0b9d0cd04b3b2e
-
Filesize
266B
MD5e48faa2582cc48816093c628b8891f51
SHA1b54aa42209f9b4920a3a65b2c1e7b762f35cb080
SHA25621b70047c7cf28ba467ffc35e53d1b89f6b1269fa6a3eb1fa9476ed123d249c2
SHA5127c7a534cdb103e6485db53f8f3f2c3f95980c75e87a6dd3da1d9a4b44354d0e8e5912019d13151e54321aa06a5fc889ae9aecdb4890036d1a75959efde2bf4d6
-
Filesize
78KB
MD5024bd2b3fb77c530fae44c543e6e5d95
SHA1acd9b69860cafa0bcdb5e709928aca48f4e97b75
SHA256c578e98b2401143ce45088d28c8d31be7ef589e15c1a1b2245067ee30bfb11dd
SHA5126f5d9925a88bbea4ff42977353076609f8599a2be5fdf54b8cece7c406d2b745445bd857b10f87ab351c08d85bd1b96e51abbfbc6ff7b583000f08da8628a347
-
Filesize
660B
MD53901438f3aa13fe7e15914d0cfd4ce96
SHA143a18f20adba55c6f0e1940260c9cd5dcfc19364
SHA256968d4cd0807ceab8b787bc85e2e636c41c48bc6ad1bf850a252b7db31d61be2b
SHA512acd74c9b730b5f18dd051f5f5f22faacbe92eff01a7b3fdaf2307e035cb67cc84b5760f70288924a2c0acae1fdc8d9371c43c0e50edfc8e475636b7c4ab6afa0
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65