Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe
Resource
win10v2004-20241007-en
General
-
Target
472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe
-
Size
78KB
-
MD5
92ee9a38ad70d82feeae916b0a0e38e0
-
SHA1
632391d112154796d2bfdf8c3c2b55f2f10b4d0f
-
SHA256
472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9
-
SHA512
868e806b651c00936f92da62359ee6a65103715586c9e552cc02622aa71ad2dd14b936c32df9952d0ba322c480d9fac143b9d1c4c7016fd73c89c273dbf43da4
-
SSDEEP
1536:psHY6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQt19/a1HY:psHYnhASyRxvhTzXPvCbW2U19/T
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe -
Deletes itself 1 IoCs
pid Process 940 tmp6FB2.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 940 tmp6FB2.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp6FB2.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp6FB2.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3812 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe Token: SeDebugPrivilege 940 tmp6FB2.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1164 3812 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe 86 PID 3812 wrote to memory of 1164 3812 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe 86 PID 3812 wrote to memory of 1164 3812 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe 86 PID 1164 wrote to memory of 4296 1164 vbc.exe 88 PID 1164 wrote to memory of 4296 1164 vbc.exe 88 PID 1164 wrote to memory of 4296 1164 vbc.exe 88 PID 3812 wrote to memory of 940 3812 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe 89 PID 3812 wrote to memory of 940 3812 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe 89 PID 3812 wrote to memory of 940 3812 472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe"C:\Users\Admin\AppData\Local\Temp\472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dpd0z6lt.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES70AC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEF86C01D7F824463A1C967564DDBC8F.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp6FB2.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6FB2.tmp.exe" C:\Users\Admin\AppData\Local\Temp\472bec59c5016e8ba9a01548cbf9d9bc7cbf8272bc6a9ffad95d4b816f6a0fe9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58314935efd5b4ab9d9a25416c5a2e1c6
SHA1d9d0f533f7348d8a36735cf1c4a465155b9dca6a
SHA256a2802188337680e1b0f4364f267994ebe5853a4a07d50abda7bf8c5c193adb29
SHA5125cf45bb7e5807d03b42069f0c50e88c10066ce19da0281b558ecad78d3d8d1dc13f9e4264937f2fd5adf08d0704723324f12cff0bac98ee2304102112926f1ad
-
Filesize
15KB
MD5ea4888478820c128c07c461e7ad32ca3
SHA1cdc2aaceb62da60ec02da174dfaaf4114daa3ed4
SHA256beee6680249996e0f2af117086008b099dea76331620d99ed9c862645c770e59
SHA512a47375819e877c4d0a05443bbebcb03529f11b2bdaa928553062b749ac72ccb111c0b3c6b59efc24a208ee2cc2608d44b567ed74ea7b9a64510b86be5a87b966
-
Filesize
266B
MD5b04fc9e241406fa6e6038d8c48edc044
SHA1ff5f68e9a2e3e782142353b0d0ec5ed500fb5d2d
SHA2566c65971862180157e4a0c8644cfa850cdb307b807e87e28962a8a561b043d5ed
SHA512546f6277eb5a8145f2737cb710be5fd16e97d19b4847169707d1924247230a7b45fc2663280109d2960363ce5720ee7eb764bb3ea1b74d9bd668e0e21de6cd3f
-
Filesize
78KB
MD50d58435a2506546bd7c353908f29368e
SHA156ce243c962912b7345fca0b8f4f1d99b659712b
SHA256bf17ea11c2fe04a53e19f2292fb7af14923ccebe3f5ad8ced9c6a82cfe4d3006
SHA512cd4fde232a4f5d5b185fe2385705e33451e91f7a5e71588e222ce58e6d01e43ab101c70199f3914d304d724fdf2412468a5a1d88bad4c9a8d3697cf01eab4cb8
-
Filesize
660B
MD535989609305f106bb686aabfa2549f2f
SHA1b5a4e7f9fd86462b66195ddc9453ef14488d9a16
SHA256c5cf6b73ac016438bea094235e093606ca090656df474e901ed720197778a4fb
SHA512d63ee6fe13e7d05b23236168967fd980a1b9ad3fa50a8bfd257af63888196a5463797746d10db6a0ed9022db0b41e0806ea517d686e846996dc2f0f1887497eb
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c