Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 11:11

General

  • Target

    ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe

  • Size

    78KB

  • MD5

    8ea499895ddd14eeec8e563398023090

  • SHA1

    c8811038c9384bea1829d29664990f1aca97da22

  • SHA256

    ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341

  • SHA512

    0b3c546bc74cd25ef2352b4cb4c9b0a0867b315d18c08b922012df3bb168ef1f20e27fc6fa9f646481068cc8300b4e25ae36c35604eeb7892cb07f3b764d5ef2

  • SSDEEP

    1536:VsHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtq9/6D1EV:VsHFo53Ln7N041Qqhgq9/6K

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe
    "C:\Users\Admin\AppData\Local\Temp\ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0oyxgyft.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB834.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE942AC5BD4B044969DFE4EB3157C9F8D.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:940
    • C:\Users\Admin\AppData\Local\Temp\tmpB72A.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpB72A.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0oyxgyft.0.vb

    Filesize

    15KB

    MD5

    676e008256e7aa8d142c65189b8ccf9c

    SHA1

    29ed85c785f19ca122edbbe3910e5d5ef4727b03

    SHA256

    60142b7a7c01f992d559def0b18ca1ad024a9b87dcdca143dd9968913a62ab35

    SHA512

    af613f3ba91f77017e0e973f490070bfc4180de0153db2fd3b0d491e91c52e7a85f3d306f2c6ac581d38fe9b12de28aa4c41c9efae29ce7086254c77c12c57f1

  • C:\Users\Admin\AppData\Local\Temp\0oyxgyft.cmdline

    Filesize

    266B

    MD5

    d398738389126bd516f2603f05b8523d

    SHA1

    6f9bec52cf6b6608820fa3d3ecb3cd1669954650

    SHA256

    267c0fa99a3ce0da8d0d09dce08d39f253f193bc2ed0eed23189c31521448d82

    SHA512

    9fe27ccaaa8e8eb5df3f63372dc53bf86c56aaa4ec99701b337cda3ea4540e5d5afd054a7063ebf50360ffbb295ad0f0e49d4a6ffb7ff0763565cae27442c23a

  • C:\Users\Admin\AppData\Local\Temp\RESB834.tmp

    Filesize

    1KB

    MD5

    611789611cd8fbbb154594dcff899dd6

    SHA1

    31bcf97b809f6371a2522cc3e9201279c38e524e

    SHA256

    f098561f0b88643dae59c29f7de1887c6f6c0fe70e72e01567729aacd25db31e

    SHA512

    fa7c96f7ae3d1f0c2627c30145fda82785e03c61e4a2773076aef12330d974ffa11a3541a95c28de28adae2f24936e218a3a90cf5c9ef568666acdbd3f8545d9

  • C:\Users\Admin\AppData\Local\Temp\tmpB72A.tmp.exe

    Filesize

    78KB

    MD5

    2074b85259f93c21efe1824e5d7fe801

    SHA1

    847880fb0da88a7d546faf44fbb95b14c11c1545

    SHA256

    a2538e4a5c8f73fca8dd1561e89d5b663c999e7f44dfee9a646eb4955b8a72c4

    SHA512

    6a62fcb896323642e58eeaee463746dc831ce70df3e1eea6f10d4f4ae484e2873367a3d4dd6d2137c8d8d6948944109032776bc524c216112c9d9f090e3d5b00

  • C:\Users\Admin\AppData\Local\Temp\vbcE942AC5BD4B044969DFE4EB3157C9F8D.TMP

    Filesize

    660B

    MD5

    fd7002257caa4b9dd1d911e8710461cb

    SHA1

    6319d6a1c0dabd3880ccce6ce5a9a6aa001072b6

    SHA256

    2b3973fd045a42136f7f2db0c02fca8a5f55c6df3e3c01c8c4103d678e5166d4

    SHA512

    eccf625c28ff87254a81b760d5d7c7a6af6ac78255a81e77ed13c2daefc596c8ca1f44174094fcccecc32fec2ce8e217cb31cff99fb71bd7688d73108ab3ba19

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/872-10-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/872-18-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/3416-23-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/3416-24-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/3416-26-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/3416-27-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/3416-28-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5100-2-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5100-0-0x0000000074A42000-0x0000000074A43000-memory.dmp

    Filesize

    4KB

  • memory/5100-1-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5100-22-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB