Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/10/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe
Resource
win10v2004-20241007-en
General
-
Target
9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe
-
Size
78KB
-
MD5
4a5397199affc4aa93e1340602f7a381
-
SHA1
001cd5f2c380e7722c997bdb907608c88309e0fd
-
SHA256
9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a
-
SHA512
e161bdc33d07fc311448a9932b990fb8370a42be387f657624a05d29cb27e7aba2c08f29cdd00a9ebd312262b593e276ab55327021884dd0e94bc451d7452970
-
SSDEEP
1536:EWtHFo6M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQteE9/NF31HG:EWtHFon3xSyRxvY3md+dWWZyeE9/NFU
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2852 tmpE688.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmpE688.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE688.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe Token: SeDebugPrivilege 2852 tmpE688.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1700 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 31 PID 2580 wrote to memory of 1700 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 31 PID 2580 wrote to memory of 1700 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 31 PID 2580 wrote to memory of 1700 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 31 PID 1700 wrote to memory of 2936 1700 vbc.exe 33 PID 1700 wrote to memory of 2936 1700 vbc.exe 33 PID 1700 wrote to memory of 2936 1700 vbc.exe 33 PID 1700 wrote to memory of 2936 1700 vbc.exe 33 PID 2580 wrote to memory of 2852 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 34 PID 2580 wrote to memory of 2852 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 34 PID 2580 wrote to memory of 2852 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 34 PID 2580 wrote to memory of 2852 2580 9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe"C:\Users\Admin\AppData\Local\Temp\9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\v74gwh3q.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE9B4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE9A4.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpE688.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE688.tmp.exe" C:\Users\Admin\AppData\Local\Temp\9dadfe0f5ab4242d2df27548aafb9f450824a933a40f34a8c1f94e02b7c26e9a.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52764032c10036e4450aa49ef7d5d976a
SHA18b99a9d0c514447274c9c0a1592b379ba10060f5
SHA2563461f09571ca972e4d7d6e4bbfe8c2acd8843508f47039890527fc6c257d74be
SHA512b35e8b900d8b91b42a5faace87d8c1987d0921c13c6717f19307819ab5765afb6b592c1e48e22e4d82153d68bf07856ccec48f2b0414ada58f767a5c7e1494ba
-
Filesize
78KB
MD58d5b209e6104cdcb3fa999b338903138
SHA1fb2b872fc68abc1e0ab831cd36e61e221b47a0e6
SHA2568c168f1dce0af93c90a5c85a232ceb3e60ef04dfb693d0bb5233809cf318dc91
SHA51213f527dee95ecc53b944ccec85b73f5c4a952d22caead93b4b9e9a231c7b5f9b144d60e34456bb059be20c6f6ec9c0a2b42497f336f1acb3e4a81a8da4cd3725
-
Filesize
15KB
MD590820151bce3e7b78516f522674ab9c7
SHA1be0de96798ed654e73c79aaa1320af195eaad128
SHA2560f3f19e458b6dc5a33744cd55d2dd3659ba7bc82dcc2fed59a763681b8cf4efa
SHA5121a9c33a4e38c2b459ee0af6cebb5c45249bd9a3f913ad6055c177c847ddc6381d8aa69371e5c8f22a5d84a2627f00f84e136294da1411b273179c079d123c4ad
-
Filesize
266B
MD5bb70b75820674d32f49060160b8121d1
SHA1ca029e47e2c74f9002e1c7752c7cd6f4fdbcb597
SHA25669f42583938ee29145222714dcf057dc03acf2c90882bda70644827de2d84de3
SHA51252b96816c74736cb7f0786417c7582dc5b308a6c27bfc816f266c80633439f28969fde3e73dc8909c529bbe8e9bfefcaf9177573557ae3a71f38b3348b4f9781
-
Filesize
660B
MD5d87c57839f61aec6593fb13314c5096a
SHA19bcb5b14435b1003fb9cce506d035bcf9773a6a7
SHA256133099628331da01e13a6416d3718081d5be1020bd8ccf11b7cd1786fcd10876
SHA5128e1ac507c6de63f761328d319573b610cc2fadbfb739a90e6af9fb48908dc30e1069758d54fa55bef4e423fff1d60180fbb23d81fe1495d7548be7a571902fed
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107