Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe
Resource
win10v2004-20241007-en
General
-
Target
ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe
-
Size
78KB
-
MD5
8ea499895ddd14eeec8e563398023090
-
SHA1
c8811038c9384bea1829d29664990f1aca97da22
-
SHA256
ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341
-
SHA512
0b3c546bc74cd25ef2352b4cb4c9b0a0867b315d18c08b922012df3bb168ef1f20e27fc6fa9f646481068cc8300b4e25ae36c35604eeb7892cb07f3b764d5ef2
-
SSDEEP
1536:VsHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtq9/6D1EV:VsHFo53Ln7N041Qqhgq9/6K
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe -
Executes dropped EXE 1 IoCs
pid Process 3416 tmpB72A.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpB72A.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpB72A.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5100 ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe Token: SeDebugPrivilege 3416 tmpB72A.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5100 wrote to memory of 872 5100 ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe 85 PID 5100 wrote to memory of 872 5100 ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe 85 PID 5100 wrote to memory of 872 5100 ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe 85 PID 872 wrote to memory of 940 872 vbc.exe 88 PID 872 wrote to memory of 940 872 vbc.exe 88 PID 872 wrote to memory of 940 872 vbc.exe 88 PID 5100 wrote to memory of 3416 5100 ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe 90 PID 5100 wrote to memory of 3416 5100 ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe 90 PID 5100 wrote to memory of 3416 5100 ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe"C:\Users\Admin\AppData\Local\Temp\ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0oyxgyft.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB834.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE942AC5BD4B044969DFE4EB3157C9F8D.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpB72A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpB72A.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ff696707f05db3738da3a9ba22c17809ed38e3a3d7e7628bf09be02e59e64341N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5676e008256e7aa8d142c65189b8ccf9c
SHA129ed85c785f19ca122edbbe3910e5d5ef4727b03
SHA25660142b7a7c01f992d559def0b18ca1ad024a9b87dcdca143dd9968913a62ab35
SHA512af613f3ba91f77017e0e973f490070bfc4180de0153db2fd3b0d491e91c52e7a85f3d306f2c6ac581d38fe9b12de28aa4c41c9efae29ce7086254c77c12c57f1
-
Filesize
266B
MD5d398738389126bd516f2603f05b8523d
SHA16f9bec52cf6b6608820fa3d3ecb3cd1669954650
SHA256267c0fa99a3ce0da8d0d09dce08d39f253f193bc2ed0eed23189c31521448d82
SHA5129fe27ccaaa8e8eb5df3f63372dc53bf86c56aaa4ec99701b337cda3ea4540e5d5afd054a7063ebf50360ffbb295ad0f0e49d4a6ffb7ff0763565cae27442c23a
-
Filesize
1KB
MD5611789611cd8fbbb154594dcff899dd6
SHA131bcf97b809f6371a2522cc3e9201279c38e524e
SHA256f098561f0b88643dae59c29f7de1887c6f6c0fe70e72e01567729aacd25db31e
SHA512fa7c96f7ae3d1f0c2627c30145fda82785e03c61e4a2773076aef12330d974ffa11a3541a95c28de28adae2f24936e218a3a90cf5c9ef568666acdbd3f8545d9
-
Filesize
78KB
MD52074b85259f93c21efe1824e5d7fe801
SHA1847880fb0da88a7d546faf44fbb95b14c11c1545
SHA256a2538e4a5c8f73fca8dd1561e89d5b663c999e7f44dfee9a646eb4955b8a72c4
SHA5126a62fcb896323642e58eeaee463746dc831ce70df3e1eea6f10d4f4ae484e2873367a3d4dd6d2137c8d8d6948944109032776bc524c216112c9d9f090e3d5b00
-
Filesize
660B
MD5fd7002257caa4b9dd1d911e8710461cb
SHA16319d6a1c0dabd3880ccce6ce5a9a6aa001072b6
SHA2562b3973fd045a42136f7f2db0c02fca8a5f55c6df3e3c01c8c4103d678e5166d4
SHA512eccf625c28ff87254a81b760d5d7c7a6af6ac78255a81e77ed13c2daefc596c8ca1f44174094fcccecc32fec2ce8e217cb31cff99fb71bd7688d73108ab3ba19
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65