Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2024, 05:52

General

  • Target

    d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe

  • Size

    78KB

  • MD5

    d9e2c2e5e4583a552a3721d9d2c2805c

  • SHA1

    d1149c0975c2e51761a63643321f2b25ff8717b6

  • SHA256

    d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2

  • SHA512

    6d180c5d02d3c56b6e713273de3a06335995be052cefc6570fc76f79213ea3a2d3f37427609935676c667e489253274c0c9ee3880a2fcd8db2703ecf7e00dee0

  • SSDEEP

    1536:T58Vdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC67B9/y1kp:T58An7N041QqhgjB9/7

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe
    "C:\Users\Admin\AppData\Local\Temp\d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jbysmr5r.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99FE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc25244503DA9846FA967C09AFD6B244C.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3100
    • C:\Users\Admin\AppData\Local\Temp\tmp9923.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9923.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES99FE.tmp

    Filesize

    1KB

    MD5

    9a90054095a93262345887f80826f0ab

    SHA1

    a3009315a1ec6c52e855015000ea0537b3daaebe

    SHA256

    324081b52a0b78229aa5c743eeb1b7e8ee1717e7cbbb21e71f9d3cea02c8ca56

    SHA512

    95064ba6bef8bfcc35c1933c81f755868e9e9f3c66ae096468ef362ea783aa333739a29132c584729c968fc967f3e9a6706e24736b79ff6bfa5b9cf50b234330

  • C:\Users\Admin\AppData\Local\Temp\jbysmr5r.0.vb

    Filesize

    14KB

    MD5

    484c9c2a7ef0aa893077beefe17be99a

    SHA1

    30dc13df322b2d2d1773da8d42bbc1dc44dde63d

    SHA256

    3b14b92e5958e05a64fb57143e75d4375e8039997a54a06254e957c442f13c37

    SHA512

    858041909145f09254c2dd761a01f11a053a2c36263c0cf898efaecace16efa8b810625adae4e67e0507f8aaf843a2c071727eaa463d0efafe03d45692d36744

  • C:\Users\Admin\AppData\Local\Temp\jbysmr5r.cmdline

    Filesize

    266B

    MD5

    8980ac179356afe7a5f282525dcc9e5f

    SHA1

    5f8dd152ecc0628d148fee357b9526ea894641c8

    SHA256

    c9690723b1ebb286c1cfb414c4d6dcb4bea9b19bf860ea9ec03f71d31e6f005b

    SHA512

    048b787bf8445f2d9e449597564f5925f96105b025a9e462397bd0c01091b112e4e33cb4507f5f6e3a60eae68076d43d91343534a974e0c89e8b054592197302

  • C:\Users\Admin\AppData\Local\Temp\tmp9923.tmp.exe

    Filesize

    78KB

    MD5

    f8eec5a908b1de758616219aca2e6074

    SHA1

    40067039b58e94c6acaa1375bb6b43bacc435bf3

    SHA256

    b2ce2582aeaf708e1d74f1d113c68481e4519c4768338b81239206fad3b08aca

    SHA512

    6cc81a3b2f0b0775424cb4627e071649ae6af7e1f39dc169fc30071fa8bc209f5ab0c3bc81ce5c27c4e7b64fb63178a802e2abca5c4af2f2fa3d4d0115df83a4

  • C:\Users\Admin\AppData\Local\Temp\vbc25244503DA9846FA967C09AFD6B244C.TMP

    Filesize

    660B

    MD5

    8776ae930de8492fc3f6fb0985274b75

    SHA1

    113ae8b2887fee52089e2ef2de52321637d11cff

    SHA256

    31c3c6df40522e265b237862a393c8e1ac77065da0b9e5ab1c9afbfb9f336c09

    SHA512

    70440f53fb239efde152c5d3a1cc66c85466b4fc6b684ce0c699e50de5633ac3ecc60b617fcc16dc214f91c317b4bd453a1b9d016bd9aee059b5df0b48cb242d

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2260-2-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/2260-0-0x00000000748C2000-0x00000000748C3000-memory.dmp

    Filesize

    4KB

  • memory/2260-1-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/2260-22-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/2768-23-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/2768-24-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/2768-26-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/2768-27-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/2768-28-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/3660-9-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/3660-18-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB