Analysis

  • max time kernel
    132s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24/03/2025, 04:44

General

  • Target

    3d98b01a737ff423a51d2b4c9569febaaea5071609b7bb732c7e4ba39b132ea2.exe

  • Size

    78KB

  • MD5

    218002d4494871551c3fd0f066c24863

  • SHA1

    b795f81b31b18c18ebf64750211ffe62f9ac12a9

  • SHA256

    3d98b01a737ff423a51d2b4c9569febaaea5071609b7bb732c7e4ba39b132ea2

  • SHA512

    05e115dd568b63d3f15802f576853b3e9f557a4dea1d80793fbbaf39270de8b015a01a0fbbbed7de115f8d4ee14f1855eea36839d1433f650a8b1b2a2d79769a

  • SSDEEP

    1536:FsHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtJ9/a1W5:FsHFo53Ln7N041QqhgJ9/l

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d98b01a737ff423a51d2b4c9569febaaea5071609b7bb732c7e4ba39b132ea2.exe
    "C:\Users\Admin\AppData\Local\Temp\3d98b01a737ff423a51d2b4c9569febaaea5071609b7bb732c7e4ba39b132ea2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\y1rizgf8.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7CEE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7CED.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2828
    • C:\Users\Admin\AppData\Local\Temp\tmp79B2.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp79B2.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3d98b01a737ff423a51d2b4c9569febaaea5071609b7bb732c7e4ba39b132ea2.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES7CEE.tmp

    Filesize

    1KB

    MD5

    8d211192cae1899688d93ad7e929dcbf

    SHA1

    28cb84567c2bfda5b8dbefa9d8338838b0930fcc

    SHA256

    96fdeda926b8aff297e87810991fd3b3e773240cd521b802192041910902b2a9

    SHA512

    cf6ff0edd9c9c3be9432f40c026a2d36f375ae4f5e5331f7b13502c73b543a8ef6e9967514163fdd293bc34c18f92b7520bc3859387795fa711237cee85f8895

  • C:\Users\Admin\AppData\Local\Temp\tmp79B2.tmp.exe

    Filesize

    78KB

    MD5

    5d6404e167cb5ff511bff0e006053ac5

    SHA1

    d6957f76a513b45142e86fe0f6b2facf4b888652

    SHA256

    72905672e462eeda39e72b2f6269903873ae0ed5f3bfdc2fd2c1006d95fe470f

    SHA512

    3a7a1d3e748a35c6aaa5f653ce5dc4bd0f818f822001c098f4d863291f6d4b0ddc5f03f194239e3c3d92aa8d4347d97053f4d24126c8c65b89d229baccb15db4

  • C:\Users\Admin\AppData\Local\Temp\vbc7CED.tmp

    Filesize

    660B

    MD5

    6e5d35bf67c038c3905f4976163be5ef

    SHA1

    f17f2f83cbff7dec63d6ccf1fccfd9b9bf19933b

    SHA256

    604db66c6e7966b2345a3a7df5ae6f760f5cbff5757dc464443815baac1be0d8

    SHA512

    1f14f4b122f7b7d9a64675b9518e0d5b6a3352e5c6a359961630f01f1ea8d8973bea30d258868edf23e5c2822af4f8f4ca341948d47fbe090bd9effdb64bd446

  • C:\Users\Admin\AppData\Local\Temp\y1rizgf8.0.vb

    Filesize

    15KB

    MD5

    1feb68e295c29241abd45cd668ff9668

    SHA1

    b60e767303f5454c31da6fd8f30f7ee401bc0d8a

    SHA256

    34711e787eae9fd6b6131123adf3c2665be36525efdc51ca51f1f50df0e6eaf1

    SHA512

    76eb9f227abb72986f8371301b5d51cc85dd545f5b5977f347aeb20d702bbcaf3ba15741246c05a75567dbfcbb41a9fab2159f98d393a0e3ebefe99ffcc975fd

  • C:\Users\Admin\AppData\Local\Temp\y1rizgf8.cmdline

    Filesize

    266B

    MD5

    95684a31e97b8a0156e46173e1cdd857

    SHA1

    2258cd855ac75cfe1d514b602714f8958a4bba0f

    SHA256

    95a4598f970b1e14d6849a7992fc59d356668c2726cf1b521b4c5396e6c51fca

    SHA512

    9d79b910363ddd79338ec0a313eb2397a3983ec876ce4aa6366b7550e5acdf1d0ef181566be4d6f05808444d514e0c2f20da636263326610643fcbee84b44e8b

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1248-8-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1248-18-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-0-0x0000000074B31000-0x0000000074B32000-memory.dmp

    Filesize

    4KB

  • memory/2060-1-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-2-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-24-0x0000000074B30000-0x00000000750DB000-memory.dmp

    Filesize

    5.7MB