Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 05:31

General

  • Target

    100ce161e73da0a9d192ad21735ad239.exe

  • Size

    78KB

  • MD5

    100ce161e73da0a9d192ad21735ad239

  • SHA1

    24bbb610639e6b5d2ae1be0ea64a59459d85e2d4

  • SHA256

    e11ca3cdc63aa37e12694d6b36a480f18c6b59aa6ab9267b64770c1d733c96c4

  • SHA512

    1817c0c2aae3e88822bbd7371432c0737fe83cdfed10ad4299471ee5e6716d00faa7af8a3a669154ae7cab038fa94a810f3907cec0c89285627f96c9b3825778

  • SSDEEP

    1536:a5jS6LT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQti6n9/3Pp1p/:a5jSkE2EwR4uY41HyvYv9/3F

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\100ce161e73da0a9d192ad21735ad239.exe
    "C:\Users\Admin\AppData\Local\Temp\100ce161e73da0a9d192ad21735ad239.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\tmp4A28.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp4A28.tmp.exe" C:\Users\Admin\AppData\Local\Temp\100ce161e73da0a9d192ad21735ad239.exe
      2⤵
        PID:2412
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\q6u1c7ka.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3860
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4AD4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8C345643D8464E88A195798F47D668F3.TMP"
      1⤵
        PID:2056

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2412-21-0x00000000747A0000-0x0000000074D51000-memory.dmp

        Filesize

        5.7MB

      • memory/2412-23-0x00000000747A0000-0x0000000074D51000-memory.dmp

        Filesize

        5.7MB

      • memory/2412-22-0x0000000000F60000-0x0000000000F70000-memory.dmp

        Filesize

        64KB

      • memory/2412-25-0x0000000000F60000-0x0000000000F70000-memory.dmp

        Filesize

        64KB

      • memory/2412-27-0x0000000000F60000-0x0000000000F70000-memory.dmp

        Filesize

        64KB

      • memory/2412-26-0x00000000747A0000-0x0000000074D51000-memory.dmp

        Filesize

        5.7MB

      • memory/2412-28-0x0000000000F60000-0x0000000000F70000-memory.dmp

        Filesize

        64KB

      • memory/4672-0-0x00000000747A0000-0x0000000074D51000-memory.dmp

        Filesize

        5.7MB

      • memory/4672-2-0x0000000001710000-0x0000000001720000-memory.dmp

        Filesize

        64KB

      • memory/4672-1-0x00000000747A0000-0x0000000074D51000-memory.dmp

        Filesize

        5.7MB

      • memory/4672-20-0x00000000747A0000-0x0000000074D51000-memory.dmp

        Filesize

        5.7MB