Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
100ce161e73da0a9d192ad21735ad239.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
100ce161e73da0a9d192ad21735ad239.exe
Resource
win10v2004-20231215-en
General
-
Target
100ce161e73da0a9d192ad21735ad239.exe
-
Size
78KB
-
MD5
100ce161e73da0a9d192ad21735ad239
-
SHA1
24bbb610639e6b5d2ae1be0ea64a59459d85e2d4
-
SHA256
e11ca3cdc63aa37e12694d6b36a480f18c6b59aa6ab9267b64770c1d733c96c4
-
SHA512
1817c0c2aae3e88822bbd7371432c0737fe83cdfed10ad4299471ee5e6716d00faa7af8a3a669154ae7cab038fa94a810f3907cec0c89285627f96c9b3825778
-
SSDEEP
1536:a5jS6LT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQti6n9/3Pp1p/:a5jSkE2EwR4uY41HyvYv9/3F
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4672 100ce161e73da0a9d192ad21735ad239.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4672 wrote to memory of 3860 4672 100ce161e73da0a9d192ad21735ad239.exe 25 PID 4672 wrote to memory of 3860 4672 100ce161e73da0a9d192ad21735ad239.exe 25 PID 4672 wrote to memory of 3860 4672 100ce161e73da0a9d192ad21735ad239.exe 25 PID 3860 wrote to memory of 2056 3860 vbc.exe 22 PID 3860 wrote to memory of 2056 3860 vbc.exe 22 PID 3860 wrote to memory of 2056 3860 vbc.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\100ce161e73da0a9d192ad21735ad239.exe"C:\Users\Admin\AppData\Local\Temp\100ce161e73da0a9d192ad21735ad239.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\tmp4A28.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4A28.tmp.exe" C:\Users\Admin\AppData\Local\Temp\100ce161e73da0a9d192ad21735ad239.exe2⤵PID:2412
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\q6u1c7ka.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3860
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4AD4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8C345643D8464E88A195798F47D668F3.TMP"1⤵PID:2056