Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 20:56

General

  • Target

    2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe

  • Size

    78KB

  • MD5

    4adfd680023da3bf0963cb67d056a4c8

  • SHA1

    8ba966cef1c6714a4f82cd2039438e56051631f2

  • SHA256

    2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623

  • SHA512

    fdc61c575eddac41a79dbeb6af0e2b22dc68f8016da18dcde4462dad4e0ba955f60d8091cfebdb64806c70c27f3ddcb45df00d660c588eb7dd252f2dbc88876d

  • SSDEEP

    1536:kc5jSwXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtC67O9/e1Vi:kc5jSoSyRxvY3md+dWWZyjO9//

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe
    "C:\Users\Admin\AppData\Local\Temp\2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3804
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wpvdlkmp.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA037.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc82902EE7A3E45B1A2026E2D01A9D69.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2148
    • C:\Users\Admin\AppData\Local\Temp\tmp9EE0.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9EE0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA037.tmp

    Filesize

    1KB

    MD5

    4476bdb4bd12cab7e66324b1b9c159bf

    SHA1

    43da41cb07ec53cc031d0f8d54ee273558c5c70e

    SHA256

    c390150af295ca420695b119f201c453f9e070601e8edd9e793d470d17a592d5

    SHA512

    30eaa4cb86fd8a6663ff4e6c068a486a3e2d8552bd42e888d07da659dad7cad929ac83d8ce1eef86127770ce740606f7b50541b6ff6c4e9504f669324e69475b

  • C:\Users\Admin\AppData\Local\Temp\tmp9EE0.tmp.exe

    Filesize

    78KB

    MD5

    c3323137730ba1d23159a8a98680248a

    SHA1

    c47fa2a55ca9f7eb2ecebf0420b5dc382a946e5c

    SHA256

    8d10826767f14211c6ea379468a7c6e0ea9cd014be6fb11db011a3e0d41f1fb2

    SHA512

    1d0e7a21df1fac1bafa9a2a7eb5a7c2d514d6a4de5040f3d870f7cfdf8581fc218c599a9136ea6f2249d7945bc4edecf3aef4494e8ad590a2feaf43fd15c26b1

  • C:\Users\Admin\AppData\Local\Temp\vbc82902EE7A3E45B1A2026E2D01A9D69.TMP

    Filesize

    660B

    MD5

    57b9e3812d5cd63d8d7de68dc985e54f

    SHA1

    453666212d509efb9da219cbda194b74750eb011

    SHA256

    937b80012481ef20ca5058fef22e27a682e0d6d8f82f098128ab52d362bad41f

    SHA512

    27ae7797600ead3a09e741f86944cdef2e707376b20e0801aae9b8bcd484616cf18da72ed81b66742bb9fb2134f26bdc1dc8c24640b486b892df1904c6067cbd

  • C:\Users\Admin\AppData\Local\Temp\wpvdlkmp.0.vb

    Filesize

    14KB

    MD5

    f14bb07d79781c95993a477aafa78f9b

    SHA1

    e6efea69d009c8834710e8af96b68b2af0545fb0

    SHA256

    5716b2b1698c207be920366a718ffba0594bdc09e6281dab2f439c9cfc4ec44f

    SHA512

    55764542a7459cb647f8e3018a72e3bf7069b652924dffb2b9e3df10ef8e9eccbae8a0eb377ec482f3fb96db4d7add5f771f3f0064acef9c5f85bac0219ba86c

  • C:\Users\Admin\AppData\Local\Temp\wpvdlkmp.cmdline

    Filesize

    266B

    MD5

    d6bbde586125665dd7b732d62291a743

    SHA1

    721064e207589902339012ea91eb87dfab1ac4c7

    SHA256

    8bbe589b1e0aa06b39bdbd37ed2a0835279f5f5cef85a25426f6b66158ad69a2

    SHA512

    4d765b22380afde05f1222ffcb6189ee59fcb061accd5096fa8c7ca8d8d168734ea0290e8fb718d4f4934f9e6e9b63634c0c82d34119824d827cb796f39827b4

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/3804-1-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3804-2-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3804-0-0x0000000074E42000-0x0000000074E43000-memory.dmp

    Filesize

    4KB

  • memory/3804-22-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-27-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-24-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-25-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-23-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-28-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-29-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-30-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3860-31-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4784-18-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4784-9-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB