Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 16:58

General

  • Target

    b7e955b408896bd111883b2797b5206d.exe

  • Size

    78KB

  • MD5

    b7e955b408896bd111883b2797b5206d

  • SHA1

    fd564fe92e456cd0777b8f6468a4cee8499c313d

  • SHA256

    b77ffa2d207284169106d837b65f41fae1fc40335d6d561f16a519507b819fcc

  • SHA512

    461b0bc42f32123fc0bf08cd008985ea9a760588daf00db5a225667baf7e9f38d5d69918f0cf639f218f6b7ab20fae27919392d8cd50f745f78e98deb886c9d8

  • SSDEEP

    1536:APWtHY6JJteVdv5wyFppaVs+aYTCgtWzYXxxiMrBnP5oYZNQtT9/21Lp:APWtHYO3e/vqyA11XYUBxprBPjcT9/y

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7e955b408896bd111883b2797b5206d.exe
    "C:\Users\Admin\AppData\Local\Temp\b7e955b408896bd111883b2797b5206d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\he73k8ty.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9232.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9222.tmp"
        3⤵
          PID:2528
      • C:\Users\Admin\AppData\Local\Temp\tmp909C.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp909C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b7e955b408896bd111883b2797b5206d.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES9232.tmp

      Filesize

      1KB

      MD5

      17a3ddf781606e7c137e6eed5045c423

      SHA1

      1ad74b1093509171f7bf8d534a531b92318e8ed4

      SHA256

      37f4326060b4d028cca9a3319d8c3d23304f51710905b0285394812d40ad8125

      SHA512

      0ffb35e64bb12fc637990cfdd46c514e29b77fbe1ccbe6e6b11a413cf4761d2626882ba6f705518c394231dd451e9b536f6646c9cc28576c5197e1a73a0b6736

    • C:\Users\Admin\AppData\Local\Temp\he73k8ty.0.vb

      Filesize

      15KB

      MD5

      a91cdd7173a3d8d00b18f34ac5f616f6

      SHA1

      f5c65ad38d30fea4cdb776981647b878c856178d

      SHA256

      3afb790491723b2c68c59b1219013a5a0769c93faf4cb4c0de8dfbe61ccc6b72

      SHA512

      0202ae19eadbb3247a2d2103c1cea188ea4a7022b5b3f6ae652e05a37d43d25408c8164d8c49d2055fe6e0b2ce4e803c1e3ee03083b84772a060cee85df13c7b

    • C:\Users\Admin\AppData\Local\Temp\he73k8ty.cmdline

      Filesize

      266B

      MD5

      ffc7faec883db618a13a38f299da25b5

      SHA1

      c1b023c2623df83205db7446596b70bca9dae483

      SHA256

      c2d22b05b8bba998b814e52589ca374a7fa9e419cc5b5b516db5c6c6664fadf3

      SHA512

      36269081aef3f7c8e5d7f2c84c5cea39f4930a7845361245178000ccfec8061a8183bf730da774f4406e712271208dad2305dc54bbc8450854dd906d6bf05917

    • C:\Users\Admin\AppData\Local\Temp\tmp909C.tmp.exe

      Filesize

      78KB

      MD5

      79c4d112a6cc3b885eba211c1c7ccd1d

      SHA1

      5c7a04e664b8afe780fe75af24e7fe55eee0480f

      SHA256

      638b2d81d09195f60d0090e93e3c436784c175b7d3a68d6119372e1e37faa4d5

      SHA512

      4de7c0bc1469ac861086cb4552d20081f23c38b7a39237180fc5cd09dec44f01be1b224a026d4533cf9be22730a76cfc1238517907db402e25a73df6fded846e

    • C:\Users\Admin\AppData\Local\Temp\vbc9222.tmp

      Filesize

      660B

      MD5

      8d2c9e4bb5bda5ea547bb5db8cd42eff

      SHA1

      f75cac531a5fe78246670bf16ba677c71489bb27

      SHA256

      352560a222abf4329f73f1a5c9806fc4f8dca20f46e040234b2e393e372d2472

      SHA512

      5447b677d8b74d9a01421ddb404e4d5b9e57ad0e700d91f000ef456a10c16dd38e0ea5a000df20edd56d0a70c3540b59158f15e81671fc25178a6fb7f59a9d0b

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      8481b7e4924c14743ffc0d34075e2ce3

      SHA1

      e8e7ef480499ba85190b8d5f8e43f761850b0ef3

      SHA256

      6110931ed1cb1b1a141d4a12044a062646f14be3566a286106e5f59ceaddc4ac

      SHA512

      3c4ee8221c5238aed57e4fdbcd74833edcf46d5ed602840b5265438538405b4378a1966e9cd0c34a5ce52d0afe7bd7e0d9aac6b420e515fe1ea52477f957a7e1

    • memory/2456-27-0x00000000744A0000-0x0000000074A4B000-memory.dmp

      Filesize

      5.7MB

    • memory/2456-30-0x0000000000490000-0x00000000004D0000-memory.dmp

      Filesize

      256KB

    • memory/2456-29-0x0000000000490000-0x00000000004D0000-memory.dmp

      Filesize

      256KB

    • memory/2456-23-0x00000000744A0000-0x0000000074A4B000-memory.dmp

      Filesize

      5.7MB

    • memory/2456-28-0x0000000000490000-0x00000000004D0000-memory.dmp

      Filesize

      256KB

    • memory/2456-24-0x0000000000490000-0x00000000004D0000-memory.dmp

      Filesize

      256KB

    • memory/2456-25-0x00000000744A0000-0x0000000074A4B000-memory.dmp

      Filesize

      5.7MB

    • memory/2720-1-0x00000000744A0000-0x0000000074A4B000-memory.dmp

      Filesize

      5.7MB

    • memory/2720-22-0x00000000744A0000-0x0000000074A4B000-memory.dmp

      Filesize

      5.7MB

    • memory/2720-2-0x0000000002120000-0x0000000002160000-memory.dmp

      Filesize

      256KB

    • memory/2720-0-0x00000000744A0000-0x0000000074A4B000-memory.dmp

      Filesize

      5.7MB