Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe
Resource
win10v2004-20241007-en
General
-
Target
19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe
-
Size
78KB
-
MD5
1d43c6117a4a3c1ce57e284755e05470
-
SHA1
f42fdd400ea16703788f856c581f935924ff9be4
-
SHA256
19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399
-
SHA512
2741c5fd9a98e9e1e71c866fa75e4e5024385ed0e41c34ad0e9b5341eda839935e42219900522a80a9eef649789f9e9f510917821b7bbf2181d95e9d7a4ba567
-
SSDEEP
1536:SCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtZ9/a1C3:SCHF8hASyRxvhTzXPvCbW2UZ9/D
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe -
Deletes itself 1 IoCs
pid Process 4200 tmpC15C.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 4200 tmpC15C.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpC15C.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpC15C.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4452 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe Token: SeDebugPrivilege 4200 tmpC15C.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4452 wrote to memory of 2328 4452 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe 84 PID 4452 wrote to memory of 2328 4452 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe 84 PID 4452 wrote to memory of 2328 4452 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe 84 PID 2328 wrote to memory of 2472 2328 vbc.exe 86 PID 2328 wrote to memory of 2472 2328 vbc.exe 86 PID 2328 wrote to memory of 2472 2328 vbc.exe 86 PID 4452 wrote to memory of 4200 4452 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe 87 PID 4452 wrote to memory of 4200 4452 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe 87 PID 4452 wrote to memory of 4200 4452 19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe"C:\Users\Admin\AppData\Local\Temp\19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cqxacyid.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC38E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE07F70603924454AB678D9E89A7DF2D9.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpC15C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpC15C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\19c46dcda296f9a78d886c536b0d6604f0ccb259ad620dc79d85c8ddc0720399N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52db0cfafd3e2947f7aee3f8322f40f8a
SHA17a4751a8c323ca8f66a54e1aa3007b2280e00f26
SHA256ee991ae90f3fa796d56cd4a959fc1d878515a6c39e02efb7df83e4929b23c428
SHA51245855d9f6a489176779dd5cfa9931ff1931b357fd8e3be29ba45a1fcf75e0a8a044e7e5401133b79f001bafbd630022a76ea0ae0a76e0d37b2f8036e7d6d04eb
-
Filesize
15KB
MD555385f93a8d50b4d11dde66bc912233a
SHA1b0846a180de77a41797ad82faf7f0ac435210632
SHA25657686e028c47557405df335569371225dbe4210489fcae4f6e2e129b4505d7eb
SHA512d5d0ea8d903646aecb953410448ec29497763a9be62a5fa9dbf8fe8cac2c35c6f9208a2b462fec0cc6f1729c2172294fd92e594b46c6390541d908ac2a8cf83a
-
Filesize
266B
MD59e44b4ca5e4dc024d3b31785836fae9f
SHA1d8338c03aa1d6edd1b41a50ddb72e574fc192c5f
SHA256b6ba720633e68d70f2dcbe5ec8f7ac4daf4f01a882e581e437c63b6a808d3c98
SHA51270df795b2293a0b74f8eaba46067f8ce7d6124fe57180648f07bb556552c81983aa77c753a5fb178ac4b8a2bf39b0509e6949545fcacbefba76930a9fc455d50
-
Filesize
78KB
MD503895c0816a2e83269fb6a7575adc6ea
SHA1a042ff5a3266e10c2784f5d0b3f45af5e88ea262
SHA256047e6643fce66a78aced1496fc814b8f1478ff3cb6921730400f229dd3e2b81c
SHA512976cb2a0e237ab8e90553df6a1915065ee378eec94cf85da55eb4a2976c8d5e5657b8ef8bdc6e9f7e1e9c7c734e0f21dc3b935bb2acb898a08266f0ade846b92
-
Filesize
660B
MD5a218dc90c4a6b7f7d779bcf5624dbff7
SHA11e2ec8ebdba5b1944002399e82f97c6cd932179a
SHA2563d94346ab0f91cee1f9065445e3a170d43904d6abc4f8a9120dffe67824eeec8
SHA512e0b653ba50efb4c485409f8ce7259056d48fb1070742a64f2ede93a42b8d601573d100348caccbd9e3ed5552e3bd7bb783bdff7711deee4cc7e3f9be6a5408da
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c