Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/12/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
Resource
win10v2004-20241007-en
General
-
Target
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
-
Size
78KB
-
MD5
c12627e95afa28641ab02f70fe8de18c
-
SHA1
e8a0e47f4aaa342977705427463117971c9b9309
-
SHA256
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba
-
SHA512
fdcce2ec2ee74c0fca3065d028e6c9b5ef8a1278d99224ba637734b7faa9a9a47a630312c2e43521fcbfd31dba12da7468bdf7176ace7f9b27c5bdf54c3e5a54
-
SSDEEP
1536:bRWV5jEdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6F9/7Y1ei:bRWV5jzn7N041Qqhgt9/7E
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2816 tmp2E51.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp2E51.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp2E51.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe Token: SeDebugPrivilege 2816 tmp2E51.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2800 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 30 PID 2660 wrote to memory of 2800 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 30 PID 2660 wrote to memory of 2800 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 30 PID 2660 wrote to memory of 2800 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 30 PID 2800 wrote to memory of 2684 2800 vbc.exe 32 PID 2800 wrote to memory of 2684 2800 vbc.exe 32 PID 2800 wrote to memory of 2684 2800 vbc.exe 32 PID 2800 wrote to memory of 2684 2800 vbc.exe 32 PID 2660 wrote to memory of 2816 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 33 PID 2660 wrote to memory of 2816 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 33 PID 2660 wrote to memory of 2816 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 33 PID 2660 wrote to memory of 2816 2660 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe"C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g2gjjt9o.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2F6B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2F6A.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5271af21d63c5d854a5a15185e353372d
SHA130bcb302902b002cdd72e6397a7bbb2b10a56a70
SHA25620650a118b7129ce0c62b54e66d6df3253a1853ee2d501fae5a4eb8da5029f2a
SHA51260e93a6f2ce2d6a596086a2e435040be8c5230647dfff6c9c02c7a599152ab8cc3cc2e4a93ca29e0327109e4ed1617eb1115171510f823ea56faa9e79f96a348
-
Filesize
14KB
MD532481d1db6721046400365c024e7c6ff
SHA1a12b00da7850422a929702576e21133c25ff7778
SHA2563fe560ac98bda23e3de8e7e77d8afece7746db8d4f5d2f8a79fb915506ed7e4f
SHA5126f43c0b1b4a5056a196c18d66a3c0860bcef4e473566150bf6f9c81769cb65cb54f50d2623b00c2c1d9661fe36f4d69144588586f0b0f78d2c4db4c1a6c5f1cf
-
Filesize
266B
MD51d0ce1d19bd796ff16e6d09815b1f616
SHA16690d4735d69edff79eaaf8b461b3a537ed05e77
SHA256b45b4153b0a8db551f6015c854af33c12bcc2f037823223009688a3f12a31290
SHA512adc69aa4338135bec5ae9383ad78864c9d6e2cd9ab48b525f673abb493f601f9aa172b6083fcaba0d08ce856e44ee740bc6a061e0d363f49bb908844608a4db2
-
Filesize
78KB
MD532f40fa7c27b5c8b5255e15abd2399f9
SHA124532108546f5a463de6aae20ad4199e8c80094b
SHA256dfea1f5026bb69de9392bff9c66e932ffd371b437bda6f97f3efbbba077d5a99
SHA5127e08e4ccc9c7d315f9a526e4afac19af1ea7b5000a4ab992937ea0f48aca11e130108e8186a91b532c5134ea9d5d8b63fe3a686cf5cb916dc256e70bc58d7cdf
-
Filesize
660B
MD5bb999d0e2d2f879c7486dd5cb369a594
SHA16f2158c0eb01f1af24d29d94fb33ab666f9f836f
SHA25663e11863925c61ef9b618b1467b5b8e2abdd6ee5eb1c307fb6348a021dc424f8
SHA5123e80461838e4ab6151def90c5e9b73e78424e7d9daf2111c7f057010d693509e3ea7f3f12441c6ca3d29f33b5d80dde04a944e44cab470ab99ff637fcbd938d4
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65