Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 18:17

General

  • Target

    0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe

  • Size

    78KB

  • MD5

    0908aa405072f2c3e8dbb55f4b684030

  • SHA1

    f35e507803ff70397a6b4417ed6f69cc94b7372b

  • SHA256

    5d84c8f6c095de440c126e97159013dd950c1fc8b045d53725b87e9e08b55010

  • SHA512

    59b219a58e4b5aa09994a1e83be6f59ef8220908c3d8f2e33f0f314fa4d80ac00cc8fe29827028436fb01112ce83e60caad6c93857f87aeded6c2de050ac80b9

  • SSDEEP

    1536:t58Vdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6i9/F143:t58An7N041Qqhg69/a

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\h3iu_svz.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3911.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4343B18F57174501BBAF8CBB403E6A22.TMP"
        3⤵
          PID:3772
      • C:\Users\Admin\AppData\Local\Temp\tmp3817.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp3817.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES3911.tmp

      Filesize

      1KB

      MD5

      44d523721a8722809b141e78595645ce

      SHA1

      e9f3f22d805855005cab1093d405da4edd6754f7

      SHA256

      c90868ad45a3caa31b5c80de5bac765488982c42122f57521fa03fc50399c274

      SHA512

      91139ff613274582afe18b85c82f453feaf56a5efefc48ffa44731db7dc5bea9a2b963648e4a4cbf379ffa53a28ac771f8e8524ebf98ab197949d472e3f3f086

    • C:\Users\Admin\AppData\Local\Temp\h3iu_svz.0.vb

      Filesize

      14KB

      MD5

      6a6b5cf22e15e5234a99c069c13f70a0

      SHA1

      9cd6bd863035608f2162af84db2acfab38db5066

      SHA256

      66630aa00d85e0dc464387d6b0c8541957b00b5d8f237dd3238e54c7470e1260

      SHA512

      60cb1b24eed98ffead64f5ea5d7bc6eeb0b048884caf5124675699643308f8d587dc749bae24186754bb8d52c688b9eb2536ba23f779cbe1708df0c8f62261dc

    • C:\Users\Admin\AppData\Local\Temp\h3iu_svz.cmdline

      Filesize

      266B

      MD5

      12d2b69a5febf96f2f41147154d54c6d

      SHA1

      4cd18dc964a4af793ada793136d1acc7754098ce

      SHA256

      c5853ff0eb6eccd01f7914bb247a5f1aceb8c51ce5905849317efe079dbfc3e4

      SHA512

      99777e8f0b8e2c5af9da03fefb2512ce1d8e80311f267f09452c9fb70f29e6e3efb03e073e1883bb239f5af102a672c93568b139070dd0e8b2fb8ff5e0757319

    • C:\Users\Admin\AppData\Local\Temp\tmp3817.tmp.exe

      Filesize

      78KB

      MD5

      22632926ec27175e480b991222c02b44

      SHA1

      76956745abdf5e2c0e21ee57b77d1e1cbea9f91d

      SHA256

      ee695180d4917f5c92af5a3d38896b559664b653800e786a90676e044d1a075b

      SHA512

      3dc58e50b2c9310be79c3934753f697cd9fd6cc5c951802c64d4061a2da401d0335cdc21b80c730ec3b43e7cbf22fce127e56d65eabf965f3e572bf50a50daad

    • C:\Users\Admin\AppData\Local\Temp\vbc4343B18F57174501BBAF8CBB403E6A22.TMP

      Filesize

      660B

      MD5

      09db878f7cb0ea0f42bf506cfab02232

      SHA1

      38c5c7cabfbca0472bc05860d57c847617bcc252

      SHA256

      7dc843254ed9a32984cc84bd8294cbe37c2c50961f01c7c133f0dfbe3d3e1312

      SHA512

      518efb5c11680a841e34b9edf7be81fbb48fdfb4434816e8222038f7d5e26b118ac2ba7520ee8b8bc41ccf35314ef9fac4d7a9087c7bf584c93cb605cd4a0b70

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      aa4bdac8c4e0538ec2bb4b7574c94192

      SHA1

      ef76d834232b67b27ebd75708922adea97aeacce

      SHA256

      d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

      SHA512

      0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

    • memory/892-9-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/892-18-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/1724-23-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/1724-24-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/1724-26-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/1724-27-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/1724-28-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/4520-0-0x0000000074DC2000-0x0000000074DC3000-memory.dmp

      Filesize

      4KB

    • memory/4520-2-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/4520-1-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB

    • memory/4520-22-0x0000000074DC0000-0x0000000075371000-memory.dmp

      Filesize

      5.7MB