Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe
Resource
win10v2004-20241007-en
General
-
Target
848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe
-
Size
78KB
-
MD5
cce8d3caaac342c9f68fb22d7d400bf4
-
SHA1
a7493335479e82d1f4fb6489cae3afee8b6e061d
-
SHA256
848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2
-
SHA512
763e2e38cd71120dcb869ab12081e72b8b9eff53e917356a2c1cacab9fe035a6c097299875466afb424f26d7254e8fc17feee6c2137d91df83c874a35721f30c
-
SSDEEP
1536:kPCHHM7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQti9/c1Ec:kPCHshASyRxvhTzXPvCbW2Ui9/U
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2748 tmp82F5.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp82F5.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp82F5.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe Token: SeDebugPrivilege 2748 tmp82F5.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1264 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 30 PID 2096 wrote to memory of 1264 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 30 PID 2096 wrote to memory of 1264 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 30 PID 2096 wrote to memory of 1264 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 30 PID 1264 wrote to memory of 2792 1264 vbc.exe 32 PID 1264 wrote to memory of 2792 1264 vbc.exe 32 PID 1264 wrote to memory of 2792 1264 vbc.exe 32 PID 1264 wrote to memory of 2792 1264 vbc.exe 32 PID 2096 wrote to memory of 2748 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 33 PID 2096 wrote to memory of 2748 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 33 PID 2096 wrote to memory of 2748 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 33 PID 2096 wrote to memory of 2748 2096 848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe"C:\Users\Admin\AppData\Local\Temp\848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\juauaglh.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8400.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc83FF.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp82F5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp82F5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\848260c0c359d9466be69bc778d1794f8ebf1ff97a878ee3f330de88b0f02de2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e18c09c1635ec91133ef1604653a4ca8
SHA1006f96f50f8695f1ea56f32c6991d99faa85610a
SHA25606571e97505e3c899c8d1221cf83c0973f70c691b026d7bb42e1128da8e7e751
SHA5128c9326cdfb728656048f66d07c14a1f141c78e061adb7a8194ecd34ab04445091cd2d2365217f87da041521fe0649573424a3ab14d0618bbe065eb2ca065bdb4
-
Filesize
15KB
MD595f8d6e709bdc9c4360bbf50aa5e119e
SHA1e3edd053d0bee52401d60484b0673731f67f0069
SHA256315c2a0ed9a2deca60b27b6f36657b8a9cb72dd8e6dc28e0a8bbbaecc3e7c66f
SHA5124993619204162c7a03ea883aa96d7e55230b00331d559076543ba39987de1f275f96f51e6231c6ad125be942c991f418fffc7438e071a414966a146c0089fd53
-
Filesize
266B
MD5aeed67b9e7233e1c28d865d0d83af9b6
SHA1f3f7c104185ee398ec148b1f5ae76a385b5109e3
SHA256ad026cd4481e994f9b2b459a094d5664eb1dd3205cdedbf2497aeca1b57933c5
SHA512bb3f8b0e1840d50b40e384cac0f89775937df8771cbbaa88d5409ead31f69a6230ff46dd30d5a42b6dd0a7b1c31f53dd1595eac5447fa18c46379697cd7cc003
-
Filesize
78KB
MD51519818057ceeb40b9a09370d3f5c16b
SHA143656edb371b64da9fda9b9c6667d0ae9d679dae
SHA256ae9eb9146d57f73947f43133e11dd127183987983e65fed20150e3c2879636be
SHA512d9ffb9c64759a13f7ce99fb02bbfad98b07daa76c30453c54b180f122c72a3bafe68b1309c03cb18dc23431ecaa798f941c77636e5d5b04494640e2bd9d9bbe5
-
Filesize
660B
MD57abdca254ed8d6b5d643037ca6bda2c8
SHA1a23f0624576da7ee34cdf1ebbcbcf8a0cea4caed
SHA256872bd7faa133d6ff89b6d71ace23764a7e1d9988ad6918bfdf5aefb22fc6c420
SHA51297080dbe3ee2a71beb709a1357181e52f969e5ce881bc7fe2fb644ee04d461b31d85aa64c082f507738af134df77730d4fd47dde46d8c414b7ed2649e550d25a
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c