Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/12/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
Resource
win10v2004-20241007-en
General
-
Target
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe
-
Size
78KB
-
MD5
c12627e95afa28641ab02f70fe8de18c
-
SHA1
e8a0e47f4aaa342977705427463117971c9b9309
-
SHA256
0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba
-
SHA512
fdcce2ec2ee74c0fca3065d028e6c9b5ef8a1278d99224ba637734b7faa9a9a47a630312c2e43521fcbfd31dba12da7468bdf7176ace7f9b27c5bdf54c3e5a54
-
SSDEEP
1536:bRWV5jEdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6F9/7Y1ei:bRWV5jzn7N041Qqhgt9/7E
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe -
Deletes itself 1 IoCs
pid Process 1232 tmp7F80.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 1232 tmp7F80.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp7F80.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7F80.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1544 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe Token: SeDebugPrivilege 1232 tmp7F80.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4784 1544 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 83 PID 1544 wrote to memory of 4784 1544 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 83 PID 1544 wrote to memory of 4784 1544 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 83 PID 4784 wrote to memory of 3348 4784 vbc.exe 85 PID 4784 wrote to memory of 3348 4784 vbc.exe 85 PID 4784 wrote to memory of 3348 4784 vbc.exe 85 PID 1544 wrote to memory of 1232 1544 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 86 PID 1544 wrote to memory of 1232 1544 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 86 PID 1544 wrote to memory of 1232 1544 0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe"C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\awj2ejxc.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8117.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4BC2BF1A6FCC4130B257D1AE4328B5D2.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7F80.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7F80.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0b1741e79d2d639e8ad5e46835cb117f98a13e62cc58f841afbcd94cb2a9a5ba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54c1d04c75f498b349a943b50b3d0f83b
SHA18bd5e832415ec0e7fe88264248147a39f4caef53
SHA25648d77aa3a64f554ccf1cef373f574d28194ea0dc37cb20669276160d5dcb7afb
SHA512b0eb6e29449174d1f05f8fad7532f175df9a3bbfffb2d77cb8ab45f4c75434744a7ea762bcc5957f7b763e4ec85aada8e52385045fc726cbfe4bea8968645908
-
Filesize
14KB
MD50d9e1e226a10b42deeee250d2c4982f8
SHA1f0ed3e0d95941f68e85b396a5480e17052f0d12b
SHA256218fb7daa6da0e126bd46b66ca7174aa21551c121ad8fe85f783befc5281c7e9
SHA512090b91339b67bba9e47f96948ddd935a4d2967b8e64ea2d5cd0e22ffac1842999f1bae5dad3e28a40f43dbde6b172e41782e3cec12ef312005b30dafdaf62452
-
Filesize
266B
MD50e3987794d148bf51393acda5ebd1568
SHA13a48256cd474bf0567cad1a425219057626e463e
SHA25683721fdc231cc5cba468d61f47175a0920b2c9ada517b34b33a6eb12d7d3f744
SHA5126c66a15b8c0d13cd299efe65119543bf8e6651a3ff2e5d3904c2c2ac8532def915e4eb8038fd95f5bd26ebdf8b6cebd38d7a2be92a51f394e8759fdd32c62f56
-
Filesize
78KB
MD5cd6dc884dbc83ccd776126c3b1646ec6
SHA16f800160742fac7455f50edb0dcf29cd90899e1d
SHA256b4aa4333292681c07277e9d189052736e7b5e010aa41fb925dcc7872c1b68826
SHA5129bc0d9458d8cc658ef1a7bbaad375f9cf24f926c6439c1ed00954af870bfb8ad8d7fb4e41ea6e767ccef9d1b10ef486b1cad757225721fff6254a57bcbca930f
-
Filesize
660B
MD5b2bb78565feef3f35c6f306fd5e91655
SHA1046619c6d7e96592c7c33655a7a7c035532563a4
SHA25612c9791baaf09390ca30d62315bff673c00efb77379f830e082cab471c7d7229
SHA5129cea9488a5e37c77516ddb990cc91947925b627945dc29946025900d2b5aa40f8af19e68b54e7e55dd9224901968a03643b57e9038e50e426c9fe1c51e69c814
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65