Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    15/11/2024, 21:37

General

  • Target

    459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe

  • Size

    78KB

  • MD5

    6d67df35944bf3ad49ced1b91c245bc5

  • SHA1

    f74f514f6ad74ec6a6da89075ab79164fa2308ed

  • SHA256

    459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e

  • SHA512

    248ce399d8f7d02bcc693e1c47362e6d654fdd543bdfc70cb31ceb35a6c822a2768363f67aaa769e6c645bd2b4d9aa7d11fbc8fd4a0b2c0b690ea40853dc4130

  • SSDEEP

    1536:phPWV5jLXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQt961i9/vB1i9:LPWV5jLSyRxvY3md+dWWZyGi9/G

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe
    "C:\Users\Admin\AppData\Local\Temp\459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ysn6n5we.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1D03.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1D02.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1532
    • C:\Users\Admin\AppData\Local\Temp\tmp1BBB.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp1BBB.tmp.exe" C:\Users\Admin\AppData\Local\Temp\459af3c8861d19444a5bb1e9de5e4242ba6302dd8f3692b5930f0eb2c8ed6b0e.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES1D03.tmp

    Filesize

    1KB

    MD5

    95cb32b0f8be21d096d7895d7bc7cf63

    SHA1

    2a591e5fd9e2c7a65467ce9e08d53ca9eb439259

    SHA256

    4499c5913b58a2afb164099c474cedcc0c58d8d95da087c106bc0d162b72679c

    SHA512

    cb22554433f97a7d88381aed28974da7cf6b7047f22ff8848598c8b952ad2c72c0e0d10a629c1f437d7f35192456602cebf7a050ab1eee0f564121b8d969c53b

  • C:\Users\Admin\AppData\Local\Temp\tmp1BBB.tmp.exe

    Filesize

    78KB

    MD5

    ccf93876318aea0cbbe1fa28afe67a5d

    SHA1

    4fe9202b8b06c6092e3b6198d917bd4ed48a2d6f

    SHA256

    097499c9b8a040ea1ad52d5c0c42b4f0c4935dd5cd3c9ea53c43d80697efcddf

    SHA512

    febe9c8a8a37d7bb876d23ea32eccecf80318baeb2b9b32d633bb8239a92b12fae595290a9f5a38ee78d10ed7f6cb064085e419f4c369d251dd2b498a584f662

  • C:\Users\Admin\AppData\Local\Temp\vbc1D02.tmp

    Filesize

    660B

    MD5

    620cff81915d1a3bdd06e73d8f4d4970

    SHA1

    0c3cd80e179131da5a8eb65327dd01c117744542

    SHA256

    efb11e3de3ae507d0246657f91f6e634f635aa4f1871532d98a9a1dc9171530c

    SHA512

    713367d13c8ce34e1c0266b383faacd6f792c450028c97941980a98e19789b249d346c6bf260e41b846d457b51af8c764be9717936f186df4f8a6bae0e2c4f56

  • C:\Users\Admin\AppData\Local\Temp\ysn6n5we.0.vb

    Filesize

    14KB

    MD5

    3e486d877821527b806f722b9275cdf5

    SHA1

    5f8c1b5b0856bce90134f4f94a28fe91ed831d9f

    SHA256

    d10c1e9b2b04c233a62e3de5e7df1d25f4e17f486a4b6c0909c999b239e646d5

    SHA512

    16d3615abc79332382e2deef8beb4d4b299830bbc434fa714ee38ae0d3e1ffc168bbec9aed680d672a78403462e0eb1f279c15e42805a13ff4ab29d76f349275

  • C:\Users\Admin\AppData\Local\Temp\ysn6n5we.cmdline

    Filesize

    266B

    MD5

    fb58aa48ca01ac967af3ad6c72dbab20

    SHA1

    21a12ed19b59330397dd518f6d0eb1dfe9780008

    SHA256

    a92ab64abc1ce15dc4ad9fa66018ca4915ba8c92b0f88c12cf633ed79e13e174

    SHA512

    46261445dc6253c73533fc5439213a19f7c843edd52dc67321b280d6ee8df8d96ad55a2abc8c88c39aed07261df9ae59122cd83f55a519e860b6954346e938b0

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/2132-0-0x0000000074C01000-0x0000000074C02000-memory.dmp

    Filesize

    4KB

  • memory/2132-1-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2132-2-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2132-24-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2488-8-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2488-18-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB