Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    161s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 08:50

General

  • Target

    ae210788bd768ba5045a507e693a8163.exe

  • Size

    78KB

  • MD5

    ae210788bd768ba5045a507e693a8163

  • SHA1

    9023d28eee827c8cf87bca3aa68df61c0426a5ca

  • SHA256

    85a35530eabc89c14ff95fb1ab1848c9749c4714bde250d3e798e77f211a627a

  • SHA512

    1296f39c090d2f56ec192dbcb54b3a86ba953dc614dae97a096c70eae3d89b0b7e5d3999f460a3ddf74783ed661325f2dd8834dba1a4a1f11794826b53334d1f

  • SSDEEP

    1536:dPWV58FXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtC639/F1j5:dPWV58FSyRxvY3md+dWWZyP9/d

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae210788bd768ba5045a507e693a8163.exe
    "C:\Users\Admin\AppData\Local\Temp\ae210788bd768ba5045a507e693a8163.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\utmg3zf9.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9C60.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9C4F.tmp"
        3⤵
          PID:2572
      • C:\Users\Admin\AppData\Local\Temp\tmp9AB9.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp9AB9.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ae210788bd768ba5045a507e693a8163.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES9C60.tmp

      Filesize

      1KB

      MD5

      74182a60c8fba7254f81edbb49f2dd74

      SHA1

      8bbb5c50e09ad2cb4c0bd5add07ee7a0ebb1fc07

      SHA256

      b78901e0578613b2c71354fb7361102a64685787a2c369d5292423ba4a0b1caa

      SHA512

      897e0a9ad356fc45e397dd65d70de470dd7c61339b992b9867d7bc3e1177ee792fb324394b4c904859a1a7e43311fa085cc10c8479ec7ce5447ea40fc7a50452

    • C:\Users\Admin\AppData\Local\Temp\tmp9AB9.tmp.exe

      Filesize

      78KB

      MD5

      329c79e51ce4f072eb3fe0f24cb06afe

      SHA1

      89cc5a3dc6fdffa84b0c8c3451d7441a58408860

      SHA256

      c1083f2af475c54fc149b20df6a0ea974829993cb149d8ec13e6821ceaa52ab0

      SHA512

      83045233fe0ca90cefaceea234e01a2080ead26e3ee6e201538a27613caae0cec5e40abfd267ffee9b50e829db0290dd8ce3385e58e629f76eaea75e5d2d162e

    • C:\Users\Admin\AppData\Local\Temp\utmg3zf9.0.vb

      Filesize

      14KB

      MD5

      a19d769ce531a7bbc9b2843f857a5352

      SHA1

      733a9862dea87814484ab99bb1824a46f5b90e3d

      SHA256

      696c94533509f50d1b07346a530b63568f078a1c99993c4540b983c0f30f7e28

      SHA512

      e8f29744abd85f616f0607f76a6c690173a3f6d66053834ff291bc561b46a48985fe274cb2bcea63bac2a2e79b31c403ed7d9e0be5684ddfb9f770f40b08e077

    • C:\Users\Admin\AppData\Local\Temp\utmg3zf9.cmdline

      Filesize

      266B

      MD5

      c6e057baab0a44697d42a96fea614370

      SHA1

      3afbc2fc08df508c43b74be26eaad88b65c323e7

      SHA256

      f82b4b819e0546ac69f9ccac9c773e4a568c976906de10e757b6508a12931371

      SHA512

      194a40fe24e2b89de0430180e5f31324191d7c500897b89536acf7cb11ffdba1e85c1e5f53a9e03f4489a0a0ba00a44f30a617341bc9d8296d05c84339f0416a

    • C:\Users\Admin\AppData\Local\Temp\vbc9C4F.tmp

      Filesize

      660B

      MD5

      99dcd86ec0843ea94dd6847ebf850237

      SHA1

      2b2f2b2794af04223e02e931ff687b8ad395f0fe

      SHA256

      3ee1ce404508f7aff28393722a954b8b6b8cb565bf30a2c3ed0c36fdbfa623ec

      SHA512

      35e0cd56cec52c2d8c38238cf05204b3dcecbbaebee2ecf9782abe15c332ec8f18a63c022eb11ce737f6a861cc2a5e2a14bd34f6a5a99d41138a80979607e4a7

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      4f0e8cf79edb6cd381474b21cabfdf4a

      SHA1

      7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

      SHA256

      e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

      SHA512

      2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

    • memory/2660-25-0x0000000073DE0000-0x000000007438B000-memory.dmp

      Filesize

      5.7MB

    • memory/2660-29-0x0000000073DE0000-0x000000007438B000-memory.dmp

      Filesize

      5.7MB

    • memory/2660-28-0x00000000021A0000-0x00000000021E0000-memory.dmp

      Filesize

      256KB

    • memory/2660-27-0x00000000021A0000-0x00000000021E0000-memory.dmp

      Filesize

      256KB

    • memory/2660-23-0x0000000073DE0000-0x000000007438B000-memory.dmp

      Filesize

      5.7MB

    • memory/2660-24-0x00000000021A0000-0x00000000021E0000-memory.dmp

      Filesize

      256KB

    • memory/2784-2-0x00000000006B0000-0x00000000006F0000-memory.dmp

      Filesize

      256KB

    • memory/2784-22-0x0000000073DE0000-0x000000007438B000-memory.dmp

      Filesize

      5.7MB

    • memory/2784-1-0x0000000073DE0000-0x000000007438B000-memory.dmp

      Filesize

      5.7MB

    • memory/2784-0-0x0000000073DE0000-0x000000007438B000-memory.dmp

      Filesize

      5.7MB