Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/12/2024, 10:08

General

  • Target

    0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe

  • Size

    78KB

  • MD5

    c12627e95afa28641ab02f70fe8de18c

  • SHA1

    e8a0e47f4aaa342977705427463117971c9b9309

  • SHA256

    0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba

  • SHA512

    fdcce2ec2ee74c0fca3065d028e6c9b5ef8a1278d99224ba637734b7faa9a9a47a630312c2e43521fcbfd31dba12da7468bdf7176ace7f9b27c5bdf54c3e5a54

  • SSDEEP

    1536:bRWV5jEdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6F9/7Y1ei:bRWV5jzn7N041Qqhgt9/7E

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
    "C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g2gjjt9o.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2F6B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2F6A.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2684
    • C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES2F6B.tmp

    Filesize

    1KB

    MD5

    271af21d63c5d854a5a15185e353372d

    SHA1

    30bcb302902b002cdd72e6397a7bbb2b10a56a70

    SHA256

    20650a118b7129ce0c62b54e66d6df3253a1853ee2d501fae5a4eb8da5029f2a

    SHA512

    60e93a6f2ce2d6a596086a2e435040be8c5230647dfff6c9c02c7a599152ab8cc3cc2e4a93ca29e0327109e4ed1617eb1115171510f823ea56faa9e79f96a348

  • C:\Users\Admin\AppData\Local\Temp\g2gjjt9o.0.vb

    Filesize

    14KB

    MD5

    32481d1db6721046400365c024e7c6ff

    SHA1

    a12b00da7850422a929702576e21133c25ff7778

    SHA256

    3fe560ac98bda23e3de8e7e77d8afece7746db8d4f5d2f8a79fb915506ed7e4f

    SHA512

    6f43c0b1b4a5056a196c18d66a3c0860bcef4e473566150bf6f9c81769cb65cb54f50d2623b00c2c1d9661fe36f4d69144588586f0b0f78d2c4db4c1a6c5f1cf

  • C:\Users\Admin\AppData\Local\Temp\g2gjjt9o.cmdline

    Filesize

    266B

    MD5

    1d0ce1d19bd796ff16e6d09815b1f616

    SHA1

    6690d4735d69edff79eaaf8b461b3a537ed05e77

    SHA256

    b45b4153b0a8db551f6015c854af33c12bcc2f037823223009688a3f12a31290

    SHA512

    adc69aa4338135bec5ae9383ad78864c9d6e2cd9ab48b525f673abb493f601f9aa172b6083fcaba0d08ce856e44ee740bc6a061e0d363f49bb908844608a4db2

  • C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe

    Filesize

    78KB

    MD5

    32f40fa7c27b5c8b5255e15abd2399f9

    SHA1

    24532108546f5a463de6aae20ad4199e8c80094b

    SHA256

    dfea1f5026bb69de9392bff9c66e932ffd371b437bda6f97f3efbbba077d5a99

    SHA512

    7e08e4ccc9c7d315f9a526e4afac19af1ea7b5000a4ab992937ea0f48aca11e130108e8186a91b532c5134ea9d5d8b63fe3a686cf5cb916dc256e70bc58d7cdf

  • C:\Users\Admin\AppData\Local\Temp\vbc2F6A.tmp

    Filesize

    660B

    MD5

    bb999d0e2d2f879c7486dd5cb369a594

    SHA1

    6f2158c0eb01f1af24d29d94fb33ab666f9f836f

    SHA256

    63e11863925c61ef9b618b1467b5b8e2abdd6ee5eb1c307fb6348a021dc424f8

    SHA512

    3e80461838e4ab6151def90c5e9b73e78424e7d9daf2111c7f057010d693509e3ea7f3f12441c6ca3d29f33b5d80dde04a944e44cab470ab99ff637fcbd938d4

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2660-0-0x0000000074351000-0x0000000074352000-memory.dmp

    Filesize

    4KB

  • memory/2660-1-0x0000000074350000-0x00000000748FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2660-2-0x0000000074350000-0x00000000748FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2660-24-0x0000000074350000-0x00000000748FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2800-8-0x0000000074350000-0x00000000748FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2800-18-0x0000000074350000-0x00000000748FB000-memory.dmp

    Filesize

    5.7MB