Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe
Resource
win10v2004-20241007-en
General
-
Target
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe
-
Size
78KB
-
MD5
2df643bd3c95f5b076371b9b15982100
-
SHA1
eab6399e99c99a6450ef68a3ae70d619ec89a08a
-
SHA256
62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6
-
SHA512
76753cd59359055b46f7bd87c2acfb01fd42a1a157160e3b645d4ba66d60a29051062401b3da390e5503180969d0b140f926f53ac2b54ad8b4d61dc0ee6f31f3
-
SSDEEP
1536:ec58ddy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQty6c9/51S8:ec58In7N041Qqhg09/b
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe -
Deletes itself 1 IoCs
pid Process 2040 tmp7494.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2040 tmp7494.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp7494.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7494.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 784 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe Token: SeDebugPrivilege 2040 tmp7494.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 784 wrote to memory of 3560 784 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 85 PID 784 wrote to memory of 3560 784 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 85 PID 784 wrote to memory of 3560 784 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 85 PID 3560 wrote to memory of 5064 3560 vbc.exe 88 PID 3560 wrote to memory of 5064 3560 vbc.exe 88 PID 3560 wrote to memory of 5064 3560 vbc.exe 88 PID 784 wrote to memory of 2040 784 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 90 PID 784 wrote to memory of 2040 784 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 90 PID 784 wrote to memory of 2040 784 62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe"C:\Users\Admin\AppData\Local\Temp\62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a7smifhh.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES75BC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB711783A6A324BB0A36E245791BD36F9.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7494.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7494.tmp.exe" C:\Users\Admin\AppData\Local\Temp\62047a3ae1a56c09a51f1646c347a6e04d6e6ac6ca88714b4be22c3cc56bd7d6N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d5c1e95a984311588b6e19b31bab18fc
SHA12f2203c41bf88b3f8cb84ac1bd2bc735cc1fcaea
SHA256ce8bcb1723bb6205b434ab37da73ebc1258cf58bfbfde3ba7e3cadf5294b7e63
SHA512fca3fe8352aaa4a23ba806833ecda94158ac3e2579ad4db2a73ebdc7beba1975ac011b68c34f934775599a675a3bda43346e8c743ee96d74afab36f5b7f4f45e
-
Filesize
14KB
MD575b3180d66a49d2f8fc4d7ab1fbd7c79
SHA19739aef8533dad910bd623c33772fb4e93cd9996
SHA2563c5bee9e57a03b477de06f889ce980af3b75697dbebabdde8549ab0b0768aba6
SHA512bb75772c88f5c5b205595d9ca06b766427ac5746c27cba23954acd4121085ecd8700a0a6c86248f56fd23e70cf2b8179044326c7b55ce7c731a0b1fcf4b28310
-
Filesize
266B
MD57af5b7350cadf2a9d9633faa52872864
SHA13dc8427e248b7048a56760c9c4bba92944418c4e
SHA25644c423bf65faaea9b4d251ebf5e6af9e2ce997e9aaee3dafc6861d741f58550b
SHA512e53de9f3152b54d5fa971fe3fe12ee9d5bf9167d6d238fa3e77b6ad1e01c6d43f29c562d2345bba47b7e743465eb909d3a7e72ca959441707ef97163105efbe8
-
Filesize
78KB
MD52a9f30a2755f3326f1b9516de22cebc2
SHA15b8229db05726f146c258af2e35cce6849a1f3aa
SHA2562ab110f277b40e950e46dbc140fa3f5232275d91ecca00de19aa6508dc8389ee
SHA512532ae124aee51153fd9008f2a770968565d25d06834ec78f7cc3e5ed2f6ef2f572945c2c6c9d9a03373b8d15fd8f70f23133c05d3fb0134af62b7e5a9148615d
-
Filesize
660B
MD5de8f0adbdc2f613a7c184dc2530b95dd
SHA1cf74bd101ed2996d5ea0f42d7199e0bd684b013e
SHA256f453dd24d65827560b84830475c63d20320f7ae2bb662aca5c242ecbd8f5322f
SHA512c4098444e964f6c01287178ab61950e054059255890abf612548c6ca6b18a792bee51fe1310fd19305c3f0186c3adc531389293bb55182bb9f3b81cf1c034b61
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65