Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe
Resource
win10v2004-20241007-en
General
-
Target
d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe
-
Size
78KB
-
MD5
6fe563b936ea01d61f2bfd5e5083d630
-
SHA1
3c69a7787a532ceaf6d6ab904b8bbcf3846d5749
-
SHA256
d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fc
-
SHA512
10b65081744506d26b2a5f11f2193eaec532fdb5f6c98158dde5952a58487d39940c7529c32f52e8faf441591ac92c0e13ab444fdf706b9a8c198b2c1229c22b
-
SSDEEP
1536:kWtHF3638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtR89/H1fW:kWtHFq3Ln7N041QqhgR89/I
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe -
Deletes itself 1 IoCs
pid Process 836 tmp7C64.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 836 tmp7C64.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp7C64.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7C64.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3172 d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe Token: SeDebugPrivilege 836 tmp7C64.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3172 wrote to memory of 1444 3172 d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe 86 PID 3172 wrote to memory of 1444 3172 d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe 86 PID 3172 wrote to memory of 1444 3172 d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe 86 PID 1444 wrote to memory of 3012 1444 vbc.exe 88 PID 1444 wrote to memory of 3012 1444 vbc.exe 88 PID 1444 wrote to memory of 3012 1444 vbc.exe 88 PID 3172 wrote to memory of 836 3172 d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe 89 PID 3172 wrote to memory of 836 3172 d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe 89 PID 3172 wrote to memory of 836 3172 d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe"C:\Users\Admin\AppData\Local\Temp\d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3vuck_ey.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D5E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc56DA3CBA1C7249BC80726B8132C48A98.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7C64.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7C64.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d9490c3c09c9841c32fc91df6debc97b2893cf5a15d9c5f8c250499128cd36fcN.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51fb75a5ffd76520bcce018441c7cd903
SHA1e2b609fd1c99dee10b87c13819fd6ec9f7cc45b6
SHA256e2d7ab9814febad93af6620cfee9fe018e7eb1a247b028c4584c5e290548b1d4
SHA5121294ea36f654501607c83ad6da3ceffd86edf7596d7d7fe4215498526d5b6ca65562599ee30da8fb74e4045588b539f798c3ec36b0c09a1bcfda9cba1f8f1250
-
Filesize
266B
MD5afdef7477cd0d913314d9c1824bad62a
SHA1a4d2cba8c03e3f9b812a9d48b6bb214493b3747e
SHA25656fbc75bfc07b272214fbd0bc2d14acb829e31d3984826364d8128c029995bd7
SHA512c734b27c02874070a6347ee4b4bddc730c76c3a00d96fae7cb2ddb9b9b159b24ff884331ec880a0a1b3378fc102ccd32ee860d1ab572c3f63f2ebfa44bec2101
-
Filesize
1KB
MD53b38b9887770372e13cbb7474595990d
SHA1f5a596a5a9a50a8eb6bb00839646d75576c044a5
SHA256c165cd51c3dee449698716864136689941ae2461a7d45b166b810244c2d7f97b
SHA512871e23883a477a4c6755c6007bee5a374341cbb7f0b59ff45cfd92d91e3e6e4236e998dc1a4bfce8af807a1be4c04d028f467c8937ababece7755df25ed84c2b
-
Filesize
78KB
MD5ba7728979831d28b30cf4d0d9bad86b5
SHA1e44adebd9d8a308fb35adf18510b3bf46e26d305
SHA2560c0b2c50e1dcfe4c578f2ee3f8bcb2d0254c17ea9c151c4e24a0e660453fd868
SHA512c1b9cd76377a9fc13bcb6780b16956027aca16469a91b01e9f2b8dd50d6e63b6b20190ee354036ce6b59b4d9d9440962867db8146d188b7df826c599bfe0cc6b
-
Filesize
660B
MD51ab4450bbfca85c78e6754abc683bf4b
SHA17370ab131edb4a7afada3a853b9ce543bbf045f1
SHA25632bdb3811024f3ac00b730e3b1d3daa1573b262b8e9d8ff4ba263bcdf355cf7c
SHA512e7d83f28bb3e2837c45bb880369ec78ecd2f594c964db77cb48336d51a3dd7d8a587a7f7a72a254cf5bdbc00ca7658fe5c5e338113035626aae65c91ec685980
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65