Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe
Resource
win10v2004-20241007-en
General
-
Target
d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe
-
Size
78KB
-
MD5
d9e2c2e5e4583a552a3721d9d2c2805c
-
SHA1
d1149c0975c2e51761a63643321f2b25ff8717b6
-
SHA256
d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2
-
SHA512
6d180c5d02d3c56b6e713273de3a06335995be052cefc6570fc76f79213ea3a2d3f37427609935676c667e489253274c0c9ee3880a2fcd8db2703ecf7e00dee0
-
SSDEEP
1536:T58Vdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC67B9/y1kp:T58An7N041QqhgjB9/7
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe -
Executes dropped EXE 1 IoCs
pid Process 2768 tmp9923.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp9923.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9923.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2260 d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe Token: SeDebugPrivilege 2768 tmp9923.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2260 wrote to memory of 3660 2260 d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe 87 PID 2260 wrote to memory of 3660 2260 d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe 87 PID 2260 wrote to memory of 3660 2260 d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe 87 PID 3660 wrote to memory of 3100 3660 vbc.exe 89 PID 3660 wrote to memory of 3100 3660 vbc.exe 89 PID 3660 wrote to memory of 3100 3660 vbc.exe 89 PID 2260 wrote to memory of 2768 2260 d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe 90 PID 2260 wrote to memory of 2768 2260 d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe 90 PID 2260 wrote to memory of 2768 2260 d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe"C:\Users\Admin\AppData\Local\Temp\d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jbysmr5r.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99FE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc25244503DA9846FA967C09AFD6B244C.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9923.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9923.tmp.exe" C:\Users\Admin\AppData\Local\Temp\d56f3748a83d82162b38887e40791bd656381125b966f6709209b69bc99cf1f2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59a90054095a93262345887f80826f0ab
SHA1a3009315a1ec6c52e855015000ea0537b3daaebe
SHA256324081b52a0b78229aa5c743eeb1b7e8ee1717e7cbbb21e71f9d3cea02c8ca56
SHA51295064ba6bef8bfcc35c1933c81f755868e9e9f3c66ae096468ef362ea783aa333739a29132c584729c968fc967f3e9a6706e24736b79ff6bfa5b9cf50b234330
-
Filesize
14KB
MD5484c9c2a7ef0aa893077beefe17be99a
SHA130dc13df322b2d2d1773da8d42bbc1dc44dde63d
SHA2563b14b92e5958e05a64fb57143e75d4375e8039997a54a06254e957c442f13c37
SHA512858041909145f09254c2dd761a01f11a053a2c36263c0cf898efaecace16efa8b810625adae4e67e0507f8aaf843a2c071727eaa463d0efafe03d45692d36744
-
Filesize
266B
MD58980ac179356afe7a5f282525dcc9e5f
SHA15f8dd152ecc0628d148fee357b9526ea894641c8
SHA256c9690723b1ebb286c1cfb414c4d6dcb4bea9b19bf860ea9ec03f71d31e6f005b
SHA512048b787bf8445f2d9e449597564f5925f96105b025a9e462397bd0c01091b112e4e33cb4507f5f6e3a60eae68076d43d91343534a974e0c89e8b054592197302
-
Filesize
78KB
MD5f8eec5a908b1de758616219aca2e6074
SHA140067039b58e94c6acaa1375bb6b43bacc435bf3
SHA256b2ce2582aeaf708e1d74f1d113c68481e4519c4768338b81239206fad3b08aca
SHA5126cc81a3b2f0b0775424cb4627e071649ae6af7e1f39dc169fc30071fa8bc209f5ab0c3bc81ce5c27c4e7b64fb63178a802e2abca5c4af2f2fa3d4d0115df83a4
-
Filesize
660B
MD58776ae930de8492fc3f6fb0985274b75
SHA1113ae8b2887fee52089e2ef2de52321637d11cff
SHA25631c3c6df40522e265b237862a393c8e1ac77065da0b9e5ab1c9afbfb9f336c09
SHA51270440f53fb239efde152c5d3a1cc66c85466b4fc6b684ce0c699e50de5633ac3ecc60b617fcc16dc214f91c317b4bd453a1b9d016bd9aee059b5df0b48cb242d
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65