Overview
overview
10Static
static
10f5ae5532f1...b5.exe
windows11-21h2-x64
10f5cb51ffdb...c0.exe
windows11-21h2-x64
10f5ed127464...bc.exe
windows11-21h2-x64
10f62837f3bc...7a.exe
windows11-21h2-x64
10f628fa20e8...3b.exe
windows11-21h2-x64
10f640f01e80...c5.exe
windows11-21h2-x64
7f66fa3036e...07.exe
windows11-21h2-x64
7f68f044685...50.exe
windows11-21h2-x64
3f6ac1ea5c1...25.exe
windows11-21h2-x64
8f6b7978847...1a.exe
windows11-21h2-x64
7f6e2978004...35.exe
windows11-21h2-x64
10f721adec82...71.exe
windows11-21h2-x64
10f736c152b3...c8.exe
windows11-21h2-x64
10f780377dd9...c9.exe
windows11-21h2-x64
7f7a96bf083...c8.exe
windows11-21h2-x64
1f812ad48d0...9b.exe
windows11-21h2-x64
10f8173be0fb...a4.exe
windows11-21h2-x64
1f835ddaf49...d7.exe
windows11-21h2-x64
10f846950431...1c.exe
windows11-21h2-x64
10f89219b77e...00.exe
windows11-21h2-x64
10f8a3f1d5a1...b0.exe
windows11-21h2-x64
10f908d30321...39.exe
windows11-21h2-x64
10f926cc363c...a8.exe
windows11-21h2-x64
10f947bf8f07...dd.exe
windows11-21h2-x64
10f97418dbfc...06.exe
windows11-21h2-x64
7f98ee08aed...cc.exe
windows11-21h2-x64
10f990d850e1...f8.exe
windows11-21h2-x64
8f99ae4a378...93.exe
windows11-21h2-x64
10f9a573b21a...18.exe
windows11-21h2-x64
10fa0d8e0c80...8e.exe
windows11-21h2-x64
10fa8e531e08...84.exe
windows11-21h2-x64
10fa942bbb98...d7.exe
windows11-21h2-x64
10Resubmissions
14/04/2025, 07:51
250414-jp1kfssjz9 1014/04/2025, 07:46
250414-jl9nyssjt9 1008/04/2025, 15:58
250408-tevasswl18 1008/04/2025, 14:19
250408-rm2nqsvqw2 10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/04/2025, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
f5ae5532f18462594d061ae3bdf732b5.exe
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
f5cb51ffdb87e6d78da4a60b2a83a2c0.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
f5ed1274646abc95fd8b87f43adcadbc.exe
Resource
win11-20250410-en
Behavioral task
behavioral4
Sample
f62837f3bc66012b94d74cc471f3d97a.exe
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
f628fa20e85aaf1cc562cfd512392d3d12da2ef70adc31068f1e3d7f2b0a4f3b.exe
Resource
win11-20250410-en
Behavioral task
behavioral6
Sample
f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
Resource
win11-20250411-en
Behavioral task
behavioral7
Sample
f66fa3036e662d8f7ccce8795fb8b907.exe
Resource
win11-20250410-en
Behavioral task
behavioral8
Sample
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
f6ac1ea5c19284854998f25244a12f25.exe
Resource
win11-20250410-en
Behavioral task
behavioral10
Sample
f6b79788476c3806befcdd2dead8231a.exe
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
f6e297800457d823c0597e833d555135.exe
Resource
win11-20250410-en
Behavioral task
behavioral12
Sample
f721adec82fb8994517719b69e8aa337d4619879e64cbd2fd80fc4e190e22c71.exe
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
f736c152b3d1812f1142ed0da99e0ac8.exe
Resource
win11-20250410-en
Behavioral task
behavioral14
Sample
f780377dd90d33c8280734d882fc2ac9.exe
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
f7a96bf0830c5f7513d65086e0f7eb6679565b6ffdc6d1e325ee21303b38fec8.exe
Resource
win11-20250410-en
Behavioral task
behavioral16
Sample
f812ad48d0a6d53611389e30fd8ae9f80a245fe3360b52dc833f6bf7b7b7859b.exe
Resource
win11-20250411-en
Behavioral task
behavioral17
Sample
f8173be0fb3bebc0120e2cb017eb9922adebbb430734d0363e2d38e28ee47ea4.exe
Resource
win11-20250410-en
Behavioral task
behavioral18
Sample
f835ddaf4933c7bd4a3aa1f015442bb48b69f863f467dd8d1db09e6f2a427fd7.exe
Resource
win11-20250410-en
Behavioral task
behavioral19
Sample
f846950431f463a0a7e663ea7003e31c.exe
Resource
win11-20250410-en
Behavioral task
behavioral20
Sample
f89219b77e5fde5a7a1581e3e4cc0b00.exe
Resource
win11-20250410-en
Behavioral task
behavioral21
Sample
f8a3f1d5a1d18a666d9b81a974e212b0.exe
Resource
win11-20250410-en
Behavioral task
behavioral22
Sample
f908d30321810e4c87131f6fea397e39.exe
Resource
win11-20250410-en
Behavioral task
behavioral23
Sample
f926cc363c27c542c23e14398096eda8.exe
Resource
win11-20250410-en
Behavioral task
behavioral24
Sample
f947bf8f07543c9beae3fdba615ba1dd.exe
Resource
win11-20250410-en
Behavioral task
behavioral25
Sample
f97418dbfcdd3f6d26c6cad46d16ec06.exe
Resource
win11-20250411-en
Behavioral task
behavioral26
Sample
f98ee08aed6b41b1f9e6e1ca752d22cc.exe
Resource
win11-20250410-en
Behavioral task
behavioral27
Sample
f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe
Resource
win11-20250410-en
Behavioral task
behavioral28
Sample
f99ae4a3786f8c8da71654ddaba30b4791692d795c93ec1f60b0c58f3be43c93.exe
Resource
win11-20250410-en
Behavioral task
behavioral29
Sample
f9a573b21a7be92000f27a3802bb3518.exe
Resource
win11-20250410-en
Behavioral task
behavioral30
Sample
fa0d8e0c80c4d5be75d4ff442d6a85ea4750bffb3526d4d2d3b2e03f3ccfb28e.exe
Resource
win11-20250410-en
Behavioral task
behavioral31
Sample
fa8e531e0860851ba2d1fb27a07f1879162d4f9bee94df2b818bae9d7834a884.exe
Resource
win11-20250410-en
Behavioral task
behavioral32
Sample
fa942bbb984e2be3a2e1d8414cc00cd7.exe
Resource
win11-20250410-en
General
-
Target
f6e297800457d823c0597e833d555135.exe
-
Size
78KB
-
MD5
f6e297800457d823c0597e833d555135
-
SHA1
bef99c4a2e1ad4c2c478f156089158cbc624f7d2
-
SHA256
da2a754ce56ec13af9f429d5dcd20ff88aadc429a1b0a74d68f217f87e31b42f
-
SHA512
69ae7dc2898887531ef8faa9740d56e6e40af3d0bafca4f2c78e4e4a37a643afa731985d9fbb9792ea61fd61927d043356a418be09b5ad1b48c73aec81af1790
-
SSDEEP
1536:7V5jSYLT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQtt6H9/0V1aj:7V5jS+E2EwR4uY41HyvYg9/0g
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 3 IoCs
pid Process 4360 tmp48D0.tmp.exe 5264 sortkey.exe 2364 tmp5E9B.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mscorsvc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sortkey.exe\"" tmp48D0.tmp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\zCom.resources sortkey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sortkey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp5E9B.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6e297800457d823c0597e833d555135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp48D0.tmp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3676 f6e297800457d823c0597e833d555135.exe Token: SeDebugPrivilege 4360 tmp48D0.tmp.exe Token: SeDebugPrivilege 5264 sortkey.exe Token: SeDebugPrivilege 2364 tmp5E9B.tmp.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3676 wrote to memory of 5984 3676 f6e297800457d823c0597e833d555135.exe 78 PID 3676 wrote to memory of 5984 3676 f6e297800457d823c0597e833d555135.exe 78 PID 3676 wrote to memory of 5984 3676 f6e297800457d823c0597e833d555135.exe 78 PID 5984 wrote to memory of 3092 5984 vbc.exe 80 PID 5984 wrote to memory of 3092 5984 vbc.exe 80 PID 5984 wrote to memory of 3092 5984 vbc.exe 80 PID 3676 wrote to memory of 4360 3676 f6e297800457d823c0597e833d555135.exe 81 PID 3676 wrote to memory of 4360 3676 f6e297800457d823c0597e833d555135.exe 81 PID 3676 wrote to memory of 4360 3676 f6e297800457d823c0597e833d555135.exe 81 PID 2984 wrote to memory of 5264 2984 cmd.exe 84 PID 2984 wrote to memory of 5264 2984 cmd.exe 84 PID 2984 wrote to memory of 5264 2984 cmd.exe 84 PID 5264 wrote to memory of 1428 5264 sortkey.exe 85 PID 5264 wrote to memory of 1428 5264 sortkey.exe 85 PID 5264 wrote to memory of 1428 5264 sortkey.exe 85 PID 1428 wrote to memory of 2368 1428 vbc.exe 87 PID 1428 wrote to memory of 2368 1428 vbc.exe 87 PID 1428 wrote to memory of 2368 1428 vbc.exe 87 PID 5264 wrote to memory of 2364 5264 sortkey.exe 88 PID 5264 wrote to memory of 2364 5264 sortkey.exe 88 PID 5264 wrote to memory of 2364 5264 sortkey.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6e297800457d823c0597e833d555135.exe"C:\Users\Admin\AppData\Local\Temp\f6e297800457d823c0597e833d555135.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jkgqe1dr.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5984 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES49CA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAFFD7852E55D48C5A229C2BFCB885135.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3092
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp48D0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp48D0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f6e297800457d823c0597e833d555135.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\sortkey.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\sortkey.exeC:\Users\Admin\AppData\Local\Temp\sortkey.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5264 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\9tj7v3mh.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5EF8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1FE58358C10C48B5866D43CD7868F1.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5E9B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5E9B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\sortkey.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD54356f4ae3a18a01430a206d30580bbbe
SHA15e83c462c84d90f20a45befee5a82a90656edd55
SHA25685e5dde1dfd0ed2c56a6030c912124dbfb7d41c0507f2030a50a03741b17a5db
SHA5129798826d553901e5f10b3858dfe01e48c1c5b8e852a9986fd41a5a92ed63b4f0f506717b56a83dcb1c297f386b5c086534b41d88c64c312bd07e8cff5ce85c52
-
Filesize
266B
MD554896a87bd4d8568b187bf623c11ab3a
SHA1eefc0ded7c123bb5f8c219b303f69f872341d609
SHA256e94762f1d5a00f974b86b737ee3de7076a823431803d04c460d8e40d1a9cbb11
SHA512534e6599132334fdf49d7984e7f19f12d1e710da52cd706a84b4b30d7169df8520a4e5df703109fbc70e3aa5bfc15eb695f9a25bb723d2189e112b15ea4c9910
-
Filesize
1KB
MD5b805bf130bcf1d4295cb8750a4d36b77
SHA1a5f18f6a8cbff4ff6d725793c2b2b906a1799438
SHA2564f01b78151cb2434f78800a42d195739b529cd349a39dd8465878c787d6e5829
SHA512da46a7fcc7464c94a030035ceea3223ef3f128d674fee94e93b5a7c00fd217f7edeb2776af080cd41b72254bcc728451ea2b5606a920465b8921459ab4554f5e
-
Filesize
1KB
MD5cc4368cdead2fc9ed4c5b162a1bd0e3f
SHA1c765989678b22ad9d2d02d937c65ab45cbe38016
SHA256e4dd62f6de6e748ba69627c087e43de023052307b891ab668b76dd0857e4c548
SHA5125857eadbf98e4251dce9b60ff8639d3799cac9d727f4305164c936a1160712825944e92039165b79561b547332ed663142c97a5245e019cb9669223e80b794d1
-
Filesize
14KB
MD5b3dcd372c3b0d1b1c2e67eb709e12eb8
SHA1e183ae88bc992d0b5250dc6601b0c456a0d015c4
SHA2566320b2a6c419a833c05294b8bd12a404659e159b184c0d7a1b332e1a3aa26840
SHA5121df92b212857a82df19219286ddb8dffa35322cb1a309d60af72b288de83cae09b0cf14f99bb165e7823dc14f530fbf4399109f17cf926433bcfaab7dfea3afe
-
Filesize
266B
MD5bdd9d1f311ea76c44d97f16bc51c8112
SHA13a4403361026e50bf6821cf56135248277c05063
SHA2564c74f82db82a5ffe664657ae20af1c479b7407201ce31ce644d8093c849065d3
SHA512decb3c95b469239ccd18563dab286f4f42b833a22a29222b0c0ceb2b2378d9646d1d7bffd1370b0b268a88142345b75443c92dd84f96775ed2a523683d18b686
-
Filesize
78KB
MD5968b859bbc1e76a8525c3caf9f2eaf31
SHA1cef7d1216c70a5530a8c8327671460547a61d212
SHA2567598972741c1c971dcf4e18cc80b34226c8a0f021c8bccf694ea2b16e5af7c0c
SHA5128cb4169df08cb0a9543756910f8edafe7ee263441cac6c5af9585a68c176e45354d92bceb2f4d7869583c114a05566542df6d32d701ed9ec906b21529d5b8f2f
-
Filesize
78KB
MD592894652cae63a38e33d941de4155ed7
SHA175d5e1896ed5a08611811792800a29ab107e8c98
SHA256ca07680457039d7b887e6b92f40123866717ca3f055aeaa00eb6a24b51d7a0a5
SHA51222bcdf668d6eb4fb6635bc57b70a2f1a4966f0acff185c1efe1e9be8b48de1d15a12ee9fd64d56665deb4a95f1b5eb200096eaf4e7efd59869375380eded7cd2
-
Filesize
660B
MD5ecf5a485ae5f8deaa3a2ffe9a7b68159
SHA195b6ef68938cd64aca2d9005abe31a28aca4b603
SHA2567ea4265c3f62c123223bc0efe5079108d9a71d96f752bcbf1cec446180df56b6
SHA5121e44c2b60341281d8a7c408d804eccb2184b33df69973ce4ab1fe18b3eb8f4eaf2123d52cc7ec40bf67f0f81e7c951ed1cf7d9783fdac38d8a39aeefd53868dc
-
Filesize
660B
MD54d9d3868ded1dea2d1da92eccdf73e77
SHA1638491a649b1b4301a4fcd030ead82a93ac11a33
SHA2562878011fa9ba2d68d9754757da5e64cf6397bd93c60b9e4a9bce3d5531dbace2
SHA512dfe2a5387d05884cb10c2dfd0f58fdf67a9b5c4a03967d373070fb9ded5100a6d241570c6c3c9f7f69ac75fd12b741578a7a1942d509e39e7a8c7759943b3ac9
-
Filesize
62KB
MD56870a276e0bed6dd5394d178156ebad0
SHA19b6005e5771bb4afb93a8862b54fe77dc4d203ee
SHA25669db906941dec2a7f1748ea1d15a058751c77d851ce54ea9e2ebdf1d6c7ed4f4
SHA5123b6f412d4bdf0939677ab6890a6417da6f737376e13375d2a60871de195aa14344b8340d254b819c850d75a443629cbf26f35533e07aaba9532fdc5284132809