Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe
Resource
win10v2004-20240802-en
General
-
Target
996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe
-
Size
78KB
-
MD5
0f754d41107c2f682d0513d0a297d7b0
-
SHA1
b0aa51275b8d9e34277874b3f99dba3c4ee053b9
-
SHA256
996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3
-
SHA512
171838b013dc5d294de64f3a4ae5c6d870c8bba71bfad3e01bb28400a174996814690f006ce294b62e9c01ba4fbcc46b4a3d7a43f3f7fde82796cedbb280a96f
-
SSDEEP
1536:Ee5OXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtC6uo49/m1Nr:Ee5GSyRxvhTzXPvCbW2Uh49/O
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2008 tmpA979.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpA979.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA979.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe Token: SeDebugPrivilege 2008 tmpA979.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1972 wrote to memory of 3032 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 30 PID 1972 wrote to memory of 3032 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 30 PID 1972 wrote to memory of 3032 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 30 PID 1972 wrote to memory of 3032 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 30 PID 3032 wrote to memory of 2544 3032 vbc.exe 32 PID 3032 wrote to memory of 2544 3032 vbc.exe 32 PID 3032 wrote to memory of 2544 3032 vbc.exe 32 PID 3032 wrote to memory of 2544 3032 vbc.exe 32 PID 1972 wrote to memory of 2008 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 33 PID 1972 wrote to memory of 2008 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 33 PID 1972 wrote to memory of 2008 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 33 PID 1972 wrote to memory of 2008 1972 996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe"C:\Users\Admin\AppData\Local\Temp\996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dahqwnp7.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAA54.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAA53.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA979.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA979.tmp.exe" C:\Users\Admin\AppData\Local\Temp\996398c3b5f0c6251f3e5bd29f8881a7a7b45da475f5040a722d22a7419db6a3N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e5b1d7ea2efcc9f668d49c9862b7acdc
SHA11d297724c93e7de223aa00e8feb787a72a3ed780
SHA256c35c6bae2c51b0bc03fc6313be475eaff0b06da7fde0840642a196ebe14d9743
SHA5123b8cd692120ac4c02600aa7949d4a46676b2dca2dbcd532ca279c3b0998c79cf7961a92c9a50d476c260ed5c5bf0f50b2b27913f701c367ab28e76ecb62b3f05
-
Filesize
14KB
MD5bd53bf31fcadc23e092941be875d3958
SHA1245d871197a2d5ba75f32044ec67c63ee9721e9c
SHA25681777a24e13d7b78f48a10337379830d63c9bd066214214f22d633faa7a246b3
SHA5123f0b3dd74beabf85bbd76822bf81b7740584ab4ec15270394f497f081898bc5c7e3d3da0d83af800634c37293841c2c06ea69060c70f22c862fdf490ed0ae7d4
-
Filesize
266B
MD55b52484201e021b831d9c52f23dfdd7f
SHA1cfb815755d0f8d74e12f02c0165b3b6e1efbab6f
SHA256d6f039f1174e71b174285bdff7a5554264739c0178d319e60f5b7d0df1494150
SHA512828fa94e73045aead11c6d20bbbe2f6fbf28c85bda3d11d3a87d54272c98bc52ac6a551f8320edbaa2f85b34e7b454dbc783498e9ca7d90027c3abe2e5ead75e
-
Filesize
78KB
MD541713e23e1ceb2f289cf5bdb311f5d87
SHA160fd94acba217c0232e57652c416b2640bcb4679
SHA25654c40e6d430ef2bcf495bfed0f1e6ea61e13ea3e8a21475c43fe049ecbf9d3b2
SHA5126a7463b2fdf80d105a34f993b9d0fc999b5e08fa4ccb306a9ea30e024497fedcf19354c98e9b916146c57bfb102940130cdea3c8eb1918d5234d118242a183ed
-
Filesize
660B
MD5dbd01761ec5e3e1205b2eb3cc9e285e0
SHA10c8d5ff86e4bfdc70306c1c46f00f25312a581a4
SHA256ed54bbae33982669f2e53ee250781cc1f14163aabaecf4a218930c002f55764d
SHA512135d83e76c1ade0ea135fdd64a7253aa388ec7849aa3c0fba39ed61c26241a786107c91aae89266f9687554d85a3cf2626ae012bff8032f4d449ab7415f00661
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c