Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe
Resource
win10v2004-20241007-en
General
-
Target
5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe
-
Size
78KB
-
MD5
2486664600f0e3671dd48e0dce874280
-
SHA1
5c73edba61cfdd544daebb8ca1abc29123a42e99
-
SHA256
5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42e
-
SHA512
3f3c477bf8f20337eab5aab91f57e466b26d6314a8a1f780281a7fdab09279fc8b8f86cc6d132ff3668da8540e04aa6e6b1ca1e13c08c020188318c4dd01a945
-
SSDEEP
1536:Uy5jS6vZv0kH9gDDtWzYCnJPeoYrGQty6j9/O1L1:Uy5jS6l0Y9MDYrm7r9/G
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe -
Executes dropped EXE 1 IoCs
pid Process 3584 tmp69E5.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmp69E5.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp69E5.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2560 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe Token: SeDebugPrivilege 3584 tmp69E5.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2560 wrote to memory of 5008 2560 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe 85 PID 2560 wrote to memory of 5008 2560 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe 85 PID 2560 wrote to memory of 5008 2560 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe 85 PID 5008 wrote to memory of 2316 5008 vbc.exe 88 PID 5008 wrote to memory of 2316 5008 vbc.exe 88 PID 5008 wrote to memory of 2316 5008 vbc.exe 88 PID 2560 wrote to memory of 3584 2560 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe 89 PID 2560 wrote to memory of 3584 2560 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe 89 PID 2560 wrote to memory of 3584 2560 5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe"C:\Users\Admin\AppData\Local\Temp\5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wpaabcfb.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6ADF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4FA5C433CBCB43A1BA002BB749306C.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp69E5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp69E5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5444b7897f710ea66ac6ce0147fcdbaf5380f8f7b0eb7132a43a805642fda42eN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD523ce5c0c4f2b1e9ac648ebb132ceb764
SHA17ca3c4069888ec65b7ab8a5e00c69c60be8ec979
SHA25676b2c3a6e2c4f444caee1ac4521d57172ba340c96209b57262ae67cfc6ce7151
SHA51296a1f57b9d6c26750642cadf513f0dc1f447d190e91823f570af631eb8f6a0897f707dec62a22371cd549e6326b3b92c4e006ac82bd4347218697070977fd756
-
Filesize
78KB
MD56fbffea8e8d9e8d2bad218d012bfa602
SHA15132a3df466b0832e787f7adec9dd1c3749a63ad
SHA256475101dd2de409d40f7e2c66bf1278259f40c502327cf176a4ff9186c907fdb2
SHA5129b9f81f394619ade9ecb832b830ea6cd2429a3a56c6a0efc658ea0a00ac37111b58f8e097f1d1e1d523e2fc3fd1b09b012f64baf27a19f7b93528feea4cbd93b
-
Filesize
660B
MD5baf9d3fb20ac31dc3168e721f7ad8180
SHA15d096f43792a15163365f991559c7a37d976b3bd
SHA25684891fe32f24ded9bac534d7e9482dd89c7bab206fea22fab4f0c7637cea8bbe
SHA512e577ea5c3e451762456a1ee3de4faeb5d2a3cf4e5f32fc28e3978c1f48d982fd0e0571351bb0f2d7c09731c16de86cd571e5c77574276b9309d62a681eb86a0b
-
Filesize
14KB
MD5f0c6436421347b7ed57baad98f1dd018
SHA16f49669d5872af734f6a3d3d85082108c0b65064
SHA256ff18a154646b121f8929a192c90663633464abeeeae0d5f8808aa6b814f0ebb6
SHA51250212de4ccbeb28ea18812fc614006606e6d617bdf13adbcc4ef1028ffcf769610dba3cc810312e39f179a05ee4f99111b8f144a8ab4cc254c668cce85b06e5b
-
Filesize
266B
MD569fc37dc0d87b3667c3777f6559f19f0
SHA1d9bbda56f187f4ea6ec8cf295860b266e10f2a64
SHA2569d8ca2f5924163523e50b47ef93a84c8b6a65a881f3937cfa554e49dfc4015f7
SHA5125414417a5a40bffbe4a2db2eec42179869c83d32062046d6544206ec486b4ec7f22275053f44a115178fd8bbd1431b4393b44840500ed6418ea0013a2da5acbe
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d