Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe
Resource
win10v2004-20241007-en
General
-
Target
e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe
-
Size
78KB
-
MD5
efd288a619127c41cade1dc188346430
-
SHA1
37e0f11628b4b298d444442daad66055ca46e19a
-
SHA256
e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26b
-
SHA512
3141741aa36d96f752fa29c19e9781bf2dd12b9b9d00caed91647248b8a3cbb257176fe336b4436b2812b728058b725fb9d945888683e4b9c150fd8e5def0411
-
SSDEEP
1536:aCHF3M7t/vZv0kH9gDDtWzYCnJPeoYrGQtG9/cc1o3:aCHF8h/l0Y9MDYrm7G9/s
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe -
Executes dropped EXE 1 IoCs
pid Process 1624 tmpBAE4.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmpBAE4.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpBAE4.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2612 e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe Token: SeDebugPrivilege 1624 tmpBAE4.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2612 wrote to memory of 4612 2612 e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe 83 PID 2612 wrote to memory of 4612 2612 e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe 83 PID 2612 wrote to memory of 4612 2612 e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe 83 PID 4612 wrote to memory of 2160 4612 vbc.exe 85 PID 4612 wrote to memory of 2160 4612 vbc.exe 85 PID 4612 wrote to memory of 2160 4612 vbc.exe 85 PID 2612 wrote to memory of 1624 2612 e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe 86 PID 2612 wrote to memory of 1624 2612 e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe 86 PID 2612 wrote to memory of 1624 2612 e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe"C:\Users\Admin\AppData\Local\Temp\e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vnbbrfhf.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC5B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCDDF245B8A34481ACC4BD8CC535408D.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpBAE4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpBAE4.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e507b509891af33480ef02a38a5a1daca9e10e094db2789016b183bd7ac9d26bN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5080e3e9b1c6c3a4832ad249881c82a2d
SHA124d00a1618a7f020cf63289c2338d66c619f4f41
SHA256ffad67cbc133d11e3d16be35a1d26f13199b633598b026d334fe419dd4ed7e70
SHA51275bba0f5b1ca84c3d98295ebd9dee2cd1e1937b964876b8a936bca978dadc3b0083015fa74d069014d9bf6d80f962aead8a124ce6adb897ea56d36daaa54e2a4
-
Filesize
78KB
MD5c01d27f8fdf3ac64b086ab979cc9cbfa
SHA17e4a7b7737ddf1fa94acdf9da1a4f7812164210f
SHA256bee0330f5ea44eb60791ab75818c9116e834b1ffa33d9bfea8cec5c8d5a7dabb
SHA5122dc49f8f9d755041f27c722a104c57850134a09d4d7603e3d22ab24096dcbb6db91915b6ab8d54ef7d3a2fccdf198bde6b739551c3c3491565b969ab56c3207c
-
Filesize
660B
MD57692fdf026093090674d807a2886a4c0
SHA11bd7fbe330da8043669d7478d2837a3c3a509fe5
SHA256f54dcdfff7c4d0df4eb1b5614722a0d9d92503842abd9d93eae395d284ad9229
SHA5123e854dee4ed7148ae9b76a70fc55e8cb478d3dd502edaec09165e37ac0337e4441a9965bceb4237de89381bfd20cbcfdf20233815afbe68973a359958683f7ce
-
Filesize
15KB
MD5e2fb29ac8984bf0bed0268fa4b343c23
SHA1791faf926d8a34aac8122ce31b23f9318c70c3a9
SHA256cc2a22fc575c1a3351dad061e9c0553d99a3034a3af130e8e5f2a7f8a65b24ec
SHA512814630fe34c6086934974a5a3f944aa7273c4eb87a4fe3dd91850275373ff2e1aaffde5c9b64eade8d720a81351894756695b0e9df7a146c49c50ce46dcb21d6
-
Filesize
266B
MD54a265e7c81e0581e62ddb8f78f8e3ae3
SHA13269816510170a61c6b65eff0aa5789abaf8a96d
SHA256a32cb9079bcab13d70ed187e5537713d9670b48c87b4bab935ffdddef09511c6
SHA51294f6a20a5a14ca872b679a05597d78a21e064a8295ddcdcb45c21e4a092c4c57daf1694a89b91f7834f64b6f475fc73f4b16dd37173fb86c39f9800b3c96fd12
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d