Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 00:26

General

  • Target

    98c0481540f85e532be17bff66786fba29ae543bf9d9807e36bc8191c22b195b.exe

  • Size

    78KB

  • MD5

    b93013d2e46816651e98af1654bf489d

  • SHA1

    df9d77cf0fff54df55a3056f1ec00b97087cd602

  • SHA256

    98c0481540f85e532be17bff66786fba29ae543bf9d9807e36bc8191c22b195b

  • SHA512

    af6305a8140448c78432226e6ca0d62491ad4dd6f07494ef88cb8bc3bf0af6a9cb5925ef698c977b0117c9e2860424d34b8a22542612e04a4fefa4432f9e2b03

  • SSDEEP

    1536:Ly58BXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN67h9/YI1MI:Ly58BSyRxvhTzXPvCbW2UEh9/Yk

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98c0481540f85e532be17bff66786fba29ae543bf9d9807e36bc8191c22b195b.exe
    "C:\Users\Admin\AppData\Local\Temp\98c0481540f85e532be17bff66786fba29ae543bf9d9807e36bc8191c22b195b.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ynofeuzy.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8132.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8131.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1672
    • C:\Users\Admin\AppData\Local\Temp\tmp8066.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp8066.tmp.exe" C:\Users\Admin\AppData\Local\Temp\98c0481540f85e532be17bff66786fba29ae543bf9d9807e36bc8191c22b195b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8132.tmp

    Filesize

    1KB

    MD5

    f3241cddc8f240082898e97887ba7f40

    SHA1

    2effa5c364dcf0e2f8f8bff4ae3eebb8ef9474b9

    SHA256

    29adb97cce335c2a74193d98093da15f04fbed72890b16e690a64e64c12dfbcd

    SHA512

    012ad0bab834500c3522626e64eb55042f4efb92890a96dff99d793610ced6ad185b61d5ad763aa4f96895e294d16b5aebf8facf2fb4496ee63a5215eb1deafc

  • C:\Users\Admin\AppData\Local\Temp\tmp8066.tmp.exe

    Filesize

    78KB

    MD5

    a8aefdf2bb95d374323b5f1d5a4c15bc

    SHA1

    88ce9d29062739c484b3c95e893859ce6554ebc6

    SHA256

    5bb369a42b5d3235ba5e5dcdae9b7c2ad22263b0779c7f9f4afc363bd5a5d1e8

    SHA512

    d527b132f84ada3e64df663b27aa7e03e506292b3c1cb7cf3e7fd7f6f459e70f846beb92f4f7ba3529c5b0c37d227109feef202d10d97fadf94a024dc544d751

  • C:\Users\Admin\AppData\Local\Temp\vbc8131.tmp

    Filesize

    660B

    MD5

    85245088ffc7378fc23b03d15f4c4a98

    SHA1

    22559dae8687066660987c02d8e90edf37dd175c

    SHA256

    eea2bea84ebf127d9b15cb7d7f188e4d848ccb176dc23abe8e5475d9c6d770a4

    SHA512

    f9b9bbb255c886a27de465bc95f92f0259fd9e44cab090144b59b00ae3a4310f5f9bcba7efaada058b154d4ad2087e75fe85f01f48f5606deb5054e0b3d3da89

  • C:\Users\Admin\AppData\Local\Temp\ynofeuzy.0.vb

    Filesize

    14KB

    MD5

    ab55a71ac5ec508029cdce7a06e52453

    SHA1

    a3ad8907b667c70b1b2fff35aa997ee12c2b9899

    SHA256

    452fdb2adc00077b67cb75f0afdbaf6e75d8361d3c147f1b1d23fc597b8cf5f1

    SHA512

    8590984c1b01da95741627ce8b0a4735b73c3dc0f161f40ca82aa7d81513f79b4a2755ae466c6dd6cf8a21b6437d87ddb1dfb26b7640e25b78d08740b21d71c7

  • C:\Users\Admin\AppData\Local\Temp\ynofeuzy.cmdline

    Filesize

    266B

    MD5

    64e8d4070b10d9864210ee1f7d87e507

    SHA1

    7a1b5e932b6053d33df5509de6cb12cd1ee88a2d

    SHA256

    bc9af02e52a329ac2f6be6d4787419fea5fd27c143cba32cc55cec5c166a3233

    SHA512

    5edb5bdfd8327e48dd9b7db1a5346d6e5e4d768f993cc2cb44c9a40c0e6c83b9edad09283d017d1b6df76ee3865d79ef371ee10627c1f28917f871518b15c9c3

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2012-8-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2012-18-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2500-0-0x0000000074801000-0x0000000074802000-memory.dmp

    Filesize

    4KB

  • memory/2500-1-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2500-2-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2500-24-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB