Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe
Resource
win10v2004-20241007-en
General
-
Target
2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe
-
Size
78KB
-
MD5
4adfd680023da3bf0963cb67d056a4c8
-
SHA1
8ba966cef1c6714a4f82cd2039438e56051631f2
-
SHA256
2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623
-
SHA512
fdc61c575eddac41a79dbeb6af0e2b22dc68f8016da18dcde4462dad4e0ba955f60d8091cfebdb64806c70c27f3ddcb45df00d660c588eb7dd252f2dbc88876d
-
SSDEEP
1536:kc5jSwXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtC67O9/e1Vi:kc5jSoSyRxvY3md+dWWZyjO9//
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe -
Executes dropped EXE 1 IoCs
pid Process 3860 tmp9EE0.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp9EE0.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9EE0.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3804 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe Token: SeDebugPrivilege 3860 tmp9EE0.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3804 wrote to memory of 4784 3804 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe 84 PID 3804 wrote to memory of 4784 3804 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe 84 PID 3804 wrote to memory of 4784 3804 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe 84 PID 4784 wrote to memory of 2148 4784 vbc.exe 87 PID 4784 wrote to memory of 2148 4784 vbc.exe 87 PID 4784 wrote to memory of 2148 4784 vbc.exe 87 PID 3804 wrote to memory of 3860 3804 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe 89 PID 3804 wrote to memory of 3860 3804 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe 89 PID 3804 wrote to memory of 3860 3804 2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe"C:\Users\Admin\AppData\Local\Temp\2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wpvdlkmp.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA037.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc82902EE7A3E45B1A2026E2D01A9D69.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9EE0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9EE0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\2f03b48d9a284dd6560be825b965f8393cb8d5e5bb3bd6a860d4a28be9709623.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54476bdb4bd12cab7e66324b1b9c159bf
SHA143da41cb07ec53cc031d0f8d54ee273558c5c70e
SHA256c390150af295ca420695b119f201c453f9e070601e8edd9e793d470d17a592d5
SHA51230eaa4cb86fd8a6663ff4e6c068a486a3e2d8552bd42e888d07da659dad7cad929ac83d8ce1eef86127770ce740606f7b50541b6ff6c4e9504f669324e69475b
-
Filesize
78KB
MD5c3323137730ba1d23159a8a98680248a
SHA1c47fa2a55ca9f7eb2ecebf0420b5dc382a946e5c
SHA2568d10826767f14211c6ea379468a7c6e0ea9cd014be6fb11db011a3e0d41f1fb2
SHA5121d0e7a21df1fac1bafa9a2a7eb5a7c2d514d6a4de5040f3d870f7cfdf8581fc218c599a9136ea6f2249d7945bc4edecf3aef4494e8ad590a2feaf43fd15c26b1
-
Filesize
660B
MD557b9e3812d5cd63d8d7de68dc985e54f
SHA1453666212d509efb9da219cbda194b74750eb011
SHA256937b80012481ef20ca5058fef22e27a682e0d6d8f82f098128ab52d362bad41f
SHA51227ae7797600ead3a09e741f86944cdef2e707376b20e0801aae9b8bcd484616cf18da72ed81b66742bb9fb2134f26bdc1dc8c24640b486b892df1904c6067cbd
-
Filesize
14KB
MD5f14bb07d79781c95993a477aafa78f9b
SHA1e6efea69d009c8834710e8af96b68b2af0545fb0
SHA2565716b2b1698c207be920366a718ffba0594bdc09e6281dab2f439c9cfc4ec44f
SHA51255764542a7459cb647f8e3018a72e3bf7069b652924dffb2b9e3df10ef8e9eccbae8a0eb377ec482f3fb96db4d7add5f771f3f0064acef9c5f85bac0219ba86c
-
Filesize
266B
MD5d6bbde586125665dd7b732d62291a743
SHA1721064e207589902339012ea91eb87dfab1ac4c7
SHA2568bbe589b1e0aa06b39bdbd37ed2a0835279f5f5cef85a25426f6b66158ad69a2
SHA5124d765b22380afde05f1222ffcb6189ee59fcb061accd5096fa8c7ca8d8d168734ea0290e8fb718d4f4934f9e6e9b63634c0c82d34119824d827cb796f39827b4
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107