Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe
Resource
win10v2004-20241007-en
General
-
Target
19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe
-
Size
78KB
-
MD5
6e4a9ddee87ef37ddb541436b6616950
-
SHA1
03fa8dbfe85a08bda3704ace8c4231dc76401fa6
-
SHA256
19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037
-
SHA512
b23532537c79589c8f62516253eeffaff340ef3855e697ec5c93ba3f89d639b7cf4c8b9b2fc290935d045b49c8e32753cfe0e69638f3cb5bd3b1dbffcf4385fa
-
SSDEEP
1536:MTy5jpAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti6C9/61QM:cy5jpAtWDDILJLovbicqOq3o+nq9/y
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe -
Deletes itself 1 IoCs
pid Process 3376 tmp929B.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 3376 tmp929B.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp929B.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp929B.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3312 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe Token: SeDebugPrivilege 3376 tmp929B.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4468 3312 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe 85 PID 3312 wrote to memory of 4468 3312 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe 85 PID 3312 wrote to memory of 4468 3312 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe 85 PID 4468 wrote to memory of 3764 4468 vbc.exe 88 PID 4468 wrote to memory of 3764 4468 vbc.exe 88 PID 4468 wrote to memory of 3764 4468 vbc.exe 88 PID 3312 wrote to memory of 3376 3312 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe 90 PID 3312 wrote to memory of 3376 3312 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe 90 PID 3312 wrote to memory of 3376 3312 19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe"C:\Users\Admin\AppData\Local\Temp\19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ztvc5da6.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES93B4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4F7143F3990440B8817C37EFC9E3E21C.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp929B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp929B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c78f4ba9a1591cf28c4be87913162f8f
SHA19cacb3aa6d011cb72d641f9d467efeee85de3539
SHA256084d01cd51d9adbef0954b1ef736c9ae4081272367673163b7c38799ff5c2f01
SHA512cfd1368045c1ec1aae5165d2c4b53ce4c766a04ad322e1ae5f885fb392710278931fa66bbf8f057044cad91ddf3a9ae02a33ee6936cc45bc30d673d5e9cd5b43
-
Filesize
78KB
MD526a9e806f5215c93f215983c6e3bc035
SHA10715b2bede92a43290d96bd410da354d28fb0805
SHA256a8754694e83bda92e3429563162fcc34b9c2e09c24505a465968fd7d353ff674
SHA51286ce93ee8a7c9f41581647a168c3fe2d951814116fb9cde9b41c676d2b6de0b7c11a202650c4c6ee78339c38a9c711f25e91041fa8bf1be71fa030fc12b00802
-
Filesize
660B
MD5878262f37b61a216f5f3863ac44c2bb6
SHA129e62da8f5236161ecad37b7d9068c036e5ca772
SHA2561c19e22d6aa779fcd1af4f4e0c63859651bb84484b5e493213d88df7c39089c5
SHA512128ad1fefd65cb7787334f33ba722fb081989703bed07713295f5bb86742c792daeb7d982bbc8ef31c1514c8eeac39265360255774d5c648f8a8d875bd5165ed
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
Filesize
14KB
MD50f120a731dd391a347aa80b311d5c0bc
SHA1823dd8c203eee6c9f20b525756623081427d444d
SHA2562a76d3f56e4b12fb3fd606a55aa0b43a22d00ac5cb854bc415b5482b1a49e409
SHA512eeacbabb0ccf7969dd30949de9600be9a486dbd570612babf1dae1dbf8204a8b058b83c43e5a7c726a088a6dfe3fe96ad6e830bd0b3ce4195ea84c6152756e98
-
Filesize
266B
MD5305e0db6681dcef000f1838d4af3ca00
SHA1bc78554f07749d1e9bc7ff908c4ab98a7fe80928
SHA256cf28ea9e03c2cf0153182a139b1feedf8295882434aefb45c39e818e9b5fc24f
SHA512748363c857789b378a93a8d593073fa3ba10dd33784dae506efe7d1802762adf63c055d35c8d0b2c26402c79a81b9d9497d7197da8c4db82b26d9f1e25544ed7