Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2024, 05:08

General

  • Target

    d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe

  • Size

    78KB

  • MD5

    6fe563b936ea01d61f2bfd5e5083d630

  • SHA1

    3c69a7787a532ceaf6d6ab904b8bbcf3846d5749

  • SHA256

    d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fc

  • SHA512

    10b65081744506d26b2a5f11f2193eaec532fdb5f6c98158dde5952a58487d39940c7529c32f52e8faf441591ac92c0e13ab444fdf706b9a8c198b2c1229c22b

  • SSDEEP

    1536:kWtHF3638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtR89/H1fW:kWtHFq3Ln7N041QqhgR89/I

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe
    "C:\Users\Admin\AppData\Local\Temp\d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3vuck_ey.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D5E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc56DA3CBA1C7249BC80726B8132C48A98.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3012
    • C:\Users\Admin\AppData\Local\Temp\tmp7C64.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp7C64.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3vuck_ey.0.vb

    Filesize

    15KB

    MD5

    1fb75a5ffd76520bcce018441c7cd903

    SHA1

    e2b609fd1c99dee10b87c13819fd6ec9f7cc45b6

    SHA256

    e2d7ab9814febad93af6620cfee9fe018e7eb1a247b028c4584c5e290548b1d4

    SHA512

    1294ea36f654501607c83ad6da3ceffd86edf7596d7d7fe4215498526d5b6ca65562599ee30da8fb74e4045588b539f798c3ec36b0c09a1bcfda9cba1f8f1250

  • C:\Users\Admin\AppData\Local\Temp\3vuck_ey.cmdline

    Filesize

    266B

    MD5

    afdef7477cd0d913314d9c1824bad62a

    SHA1

    a4d2cba8c03e3f9b812a9d48b6bb214493b3747e

    SHA256

    56fbc75bfc07b272214fbd0bc2d14acb829e31d3984826364d8128c029995bd7

    SHA512

    c734b27c02874070a6347ee4b4bddc730c76c3a00d96fae7cb2ddb9b9b159b24ff884331ec880a0a1b3378fc102ccd32ee860d1ab572c3f63f2ebfa44bec2101

  • C:\Users\Admin\AppData\Local\Temp\RES7D5E.tmp

    Filesize

    1KB

    MD5

    3b38b9887770372e13cbb7474595990d

    SHA1

    f5a596a5a9a50a8eb6bb00839646d75576c044a5

    SHA256

    c165cd51c3dee449698716864136689941ae2461a7d45b166b810244c2d7f97b

    SHA512

    871e23883a477a4c6755c6007bee5a374341cbb7f0b59ff45cfd92d91e3e6e4236e998dc1a4bfce8af807a1be4c04d028f467c8937ababece7755df25ed84c2b

  • C:\Users\Admin\AppData\Local\Temp\tmp7C64.tmp.exe

    Filesize

    78KB

    MD5

    ba7728979831d28b30cf4d0d9bad86b5

    SHA1

    e44adebd9d8a308fb35adf18510b3bf46e26d305

    SHA256

    0c0b2c50e1dcfe4c578f2ee3f8bcb2d0254c17ea9c151c4e24a0e660453fd868

    SHA512

    c1b9cd76377a9fc13bcb6780b16956027aca16469a91b01e9f2b8dd50d6e63b6b20190ee354036ce6b59b4d9d9440962867db8146d188b7df826c599bfe0cc6b

  • C:\Users\Admin\AppData\Local\Temp\vbc56DA3CBA1C7249BC80726B8132C48A98.TMP

    Filesize

    660B

    MD5

    1ab4450bbfca85c78e6754abc683bf4b

    SHA1

    7370ab131edb4a7afada3a853b9ce543bbf045f1

    SHA256

    32bdb3811024f3ac00b730e3b1d3daa1573b262b8e9d8ff4ba263bcdf355cf7c

    SHA512

    e7d83f28bb3e2837c45bb880369ec78ecd2f594c964db77cb48336d51a3dd7d8a587a7f7a72a254cf5bdbc00ca7658fe5c5e338113035626aae65c91ec685980

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/836-23-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/836-24-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/836-26-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/836-27-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/836-28-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/1444-8-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/1444-18-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/3172-2-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/3172-1-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/3172-22-0x0000000074B80000-0x0000000075131000-memory.dmp

    Filesize

    5.7MB

  • memory/3172-0-0x0000000074B82000-0x0000000074B83000-memory.dmp

    Filesize

    4KB