Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
15/11/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe
Resource
win10v2004-20241007-en
General
-
Target
459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe
-
Size
78KB
-
MD5
6d67df35944bf3ad49ced1b91c245bc5
-
SHA1
f74f514f6ad74ec6a6da89075ab79164fa2308ed
-
SHA256
459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e
-
SHA512
248ce399d8f7d02bcc693e1c47362e6d654fdd543bdfc70cb31ceb35a6c822a2768363f67aaa769e6c645bd2b4d9aa7d11fbc8fd4a0b2c0b690ea40853dc4130
-
SSDEEP
1536:phPWV5jLXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQt961i9/vB1i9:LPWV5jLSyRxvY3md+dWWZyGi9/G
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 1308 tmp1BBB.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp1BBB.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp1BBB.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe Token: SeDebugPrivilege 1308 tmp1BBB.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2488 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 30 PID 2132 wrote to memory of 2488 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 30 PID 2132 wrote to memory of 2488 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 30 PID 2132 wrote to memory of 2488 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 30 PID 2488 wrote to memory of 1532 2488 vbc.exe 32 PID 2488 wrote to memory of 1532 2488 vbc.exe 32 PID 2488 wrote to memory of 1532 2488 vbc.exe 32 PID 2488 wrote to memory of 1532 2488 vbc.exe 32 PID 2132 wrote to memory of 1308 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 33 PID 2132 wrote to memory of 1308 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 33 PID 2132 wrote to memory of 1308 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 33 PID 2132 wrote to memory of 1308 2132 459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe"C:\Users\Admin\AppData\Local\Temp\459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ysn6n5we.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1D03.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1D02.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1BBB.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1BBB.tmp.exe" C:\Users\Admin\AppData\Local\Temp\459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595cb32b0f8be21d096d7895d7bc7cf63
SHA12a591e5fd9e2c7a65467ce9e08d53ca9eb439259
SHA2564499c5913b58a2afb164099c474cedcc0c58d8d95da087c106bc0d162b72679c
SHA512cb22554433f97a7d88381aed28974da7cf6b7047f22ff8848598c8b952ad2c72c0e0d10a629c1f437d7f35192456602cebf7a050ab1eee0f564121b8d969c53b
-
Filesize
78KB
MD5ccf93876318aea0cbbe1fa28afe67a5d
SHA14fe9202b8b06c6092e3b6198d917bd4ed48a2d6f
SHA256097499c9b8a040ea1ad52d5c0c42b4f0c4935dd5cd3c9ea53c43d80697efcddf
SHA512febe9c8a8a37d7bb876d23ea32eccecf80318baeb2b9b32d633bb8239a92b12fae595290a9f5a38ee78d10ed7f6cb064085e419f4c369d251dd2b498a584f662
-
Filesize
660B
MD5620cff81915d1a3bdd06e73d8f4d4970
SHA10c3cd80e179131da5a8eb65327dd01c117744542
SHA256efb11e3de3ae507d0246657f91f6e634f635aa4f1871532d98a9a1dc9171530c
SHA512713367d13c8ce34e1c0266b383faacd6f792c450028c97941980a98e19789b249d346c6bf260e41b846d457b51af8c764be9717936f186df4f8a6bae0e2c4f56
-
Filesize
14KB
MD53e486d877821527b806f722b9275cdf5
SHA15f8c1b5b0856bce90134f4f94a28fe91ed831d9f
SHA256d10c1e9b2b04c233a62e3de5e7df1d25f4e17f486a4b6c0909c999b239e646d5
SHA51216d3615abc79332382e2deef8beb4d4b299830bbc434fa714ee38ae0d3e1ffc168bbec9aed680d672a78403462e0eb1f279c15e42805a13ff4ab29d76f349275
-
Filesize
266B
MD5fb58aa48ca01ac967af3ad6c72dbab20
SHA121a12ed19b59330397dd518f6d0eb1dfe9780008
SHA256a92ab64abc1ce15dc4ad9fa66018ca4915ba8c92b0f88c12cf633ed79e13e174
SHA51246261445dc6253c73533fc5439213a19f7c843edd52dc67321b280d6ee8df8d96ad55a2abc8c88c39aed07261df9ae59122cd83f55a519e860b6954346e938b0
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107