Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/10/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe
Resource
win10v2004-20241007-en
General
-
Target
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe
-
Size
78KB
-
MD5
2df643bd3c95f5b076371b9b15982100
-
SHA1
eab6399e99c99a6450ef68a3ae70d619ec89a08a
-
SHA256
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6
-
SHA512
76753cd59359055b46f7bd87c2acfb01fd42a1a157160e3b645d4ba66d60a29051062401b3da390e5503180969d0b140f926f53ac2b54ad8b4d61dc0ee6f31f3
-
SSDEEP
1536:ec58ddy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQty6c9/51S8:ec58In7N041Qqhg09/b
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2884 tmp5C24.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp5C24.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp5C24.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe Token: SeDebugPrivilege 2884 tmp5C24.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2548 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 28 PID 2032 wrote to memory of 2548 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 28 PID 2032 wrote to memory of 2548 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 28 PID 2032 wrote to memory of 2548 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 28 PID 2548 wrote to memory of 2620 2548 vbc.exe 30 PID 2548 wrote to memory of 2620 2548 vbc.exe 30 PID 2548 wrote to memory of 2620 2548 vbc.exe 30 PID 2548 wrote to memory of 2620 2548 vbc.exe 30 PID 2032 wrote to memory of 2884 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 31 PID 2032 wrote to memory of 2884 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 31 PID 2032 wrote to memory of 2884 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 31 PID 2032 wrote to memory of 2884 2032 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe"C:\Users\Admin\AppData\Local\Temp\62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kkr2puwo.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5D1F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5D1E.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5C24.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5C24.tmp.exe" C:\Users\Admin\AppData\Local\Temp\62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561d53cef2e9245bf7b7a8b02f3fa0b99
SHA1ce6a47060ed3e1f075e416d58215e43ff2386429
SHA25673625973a1547e617e8044d6f56038a449f820173e2a8ff7dfa25cc6e970123f
SHA512adf724a39bf7b77b39d7647a0eb428ec6c77eab5a5058651294c19d28c7630778372354fba4300fda55417aab015d6ab11e75f283454e0df6fc222f30529b75e
-
Filesize
14KB
MD52def1f296927b714b99b103397c8a181
SHA1ca4ec777b2354eefb0386b78688813f39dc11d45
SHA2562920f43df97e18a2c2f0fe9a0ac147f22b60bc2db4b9e2ccb033e511ae446f3f
SHA5127ecb5c4acf718fda46e7532665cb1561246b3f0a3384484d05ac7b000f81e8c08267b96b06fedd2c4c6200af539ee2789ee8a83385b10012f6afa1d06a08beb9
-
Filesize
266B
MD5a0bb4d38ad0dbb704af046e91cf91e92
SHA1b343a9b3853f1b962acb14dd41cabdd231f81034
SHA256023ac18ac9983d3db8dd3d5bf6e76867c9b2ebcc217e058be0f385920d7d82a7
SHA5125a0bf64b099b5d0de4f40047db6c17702791cbaa7e079a9e29e0227bedffc8f059fa3138a75dcf33a45aa34d95cdee92822450292fa00ad6f4dcd3dda078034d
-
Filesize
78KB
MD5f97c4908aa62a7c3743d754d59a4a9e7
SHA109231df51dd0db228b901b5be32cd51a4ec7f95e
SHA256efd7d2a8de4c6c96913308695f759a42691919fa840ed4133bcbe11c36fdf5f0
SHA512300b49caf801495006f32e74dd3b1b6540e72afdf507cae00fb46678837e1e11bbc17a098440208dbb8e965a7cc7bf2868b707413236fa1df95cca976d5963c1
-
Filesize
660B
MD52a5d143257da217de97c68472386d86c
SHA1044f43f1a966ccf84a30826a42bc2bfe107fcc2c
SHA2568b6d24301be350705ab62168fcb75a4337520f7b38b76c6186f9eb2213ed89ad
SHA5123b433055d665871ad58403ece2dd2b22517ef1edec1bc3b62a2ae83aa3700992edcf386b71a2d69a1ef3685562b7861b3b6d48e97356ae5715b06a7ce221417e
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65