Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe
Resource
win10v2004-20241007-en
General
-
Target
8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe
-
Size
78KB
-
MD5
84dc42a761655e59101c145d75136ac0
-
SHA1
7cd31e3da685cf9dd1bbc5074e0ff29f539f4cd3
-
SHA256
8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503
-
SHA512
1c1793be6a636463061d045092b7b1fceb61c82f989e80b4877516c3fba2372efd137a28de68a3e36d7f17678af5f319681690b1443372f9b2385b5273d12f69
-
SSDEEP
1536:oPCHHM3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQto9/u1xgQ:oPCHs3xSyRxvY3md+dWWZyo9/lQ
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 1708 tmp46EF.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp46EF.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp46EF.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe Token: SeDebugPrivilege 1708 tmp46EF.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2680 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 30 PID 2748 wrote to memory of 2680 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 30 PID 2748 wrote to memory of 2680 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 30 PID 2748 wrote to memory of 2680 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 30 PID 2680 wrote to memory of 2896 2680 vbc.exe 32 PID 2680 wrote to memory of 2896 2680 vbc.exe 32 PID 2680 wrote to memory of 2896 2680 vbc.exe 32 PID 2680 wrote to memory of 2896 2680 vbc.exe 32 PID 2748 wrote to memory of 1708 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 33 PID 2748 wrote to memory of 1708 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 33 PID 2748 wrote to memory of 1708 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 33 PID 2748 wrote to memory of 1708 2748 8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe"C:\Users\Admin\AppData\Local\Temp\8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dnceskis.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4876.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4875.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp46EF.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp46EF.tmp.exe" C:\Users\Admin\AppData\Local\Temp\8268530139ba0ef6b82f638e3e7c4902896aa8ad6ced833a688d00dbb074c503.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51ebbb37401a9c1ca9139e7dcb9bf683f
SHA1f0653150ac415c75197ab83fdeb228da5e408a62
SHA2560f5906de315aa06acfd3102b4514119ce83a469d8869b856fd739c5590a81090
SHA5129c63943fe10f513782630db4b920124efea193e33f8cdf2ed1860bf8f622fbf39d87208a3da12a3948e8822bb782c24257c6ea62cba667bc9c73d3b218cb4a31
-
Filesize
15KB
MD57bebcc2a04ee983a0310d79b17ca6eb3
SHA112e799034eca46070d72e4bc50fe5877e7068aae
SHA256f43cc19334d04eeb53b468b17cbd80080a282b498e97a3e43c10b9b4222623ff
SHA512c50f6a7ce9269a233a2d6bb0db68a3f6057fd0a4f3a79100c936426d3e6bdf6eef2f626e975cab1139923148847d13b91d5958588539ce320e790fb2f12ca9fd
-
Filesize
266B
MD51eb497dae6f381a7c5b4b02a63cef39f
SHA1173a91a7f7519e3ae632d3edd23456dccf8781b0
SHA25692c173010cf8123f43c8c00e6d925b4eb7fe7cd4c5dea94e937c1e4caf08b76a
SHA512c8db543e375b6f37a48ff8eeaa98cfd650036ae604cf7cd0e08de58f29a29c1f358f65084267d42eb8524901f25304882170ec53b26c07c58c006c3c6dbe0534
-
Filesize
78KB
MD51dbd83490000b0a05ec501f4a987c46a
SHA1fec8d3e0aeb3b79d5b40a33cf817afb4a5d7522d
SHA256a009c0120c74c31eea39a6a5b874b692eb0e7ce9589a1d023deeaf20fcfd6e0c
SHA512f85e0df642c969d52cb9c9bfe62a7f3848a406f326079c4f60b653278b720c592766f462907bcba8089e680e82ae74c22de3688384495895d67508ec1ec922d1
-
Filesize
660B
MD50edc508c2d9835eaf02adf7ceb7dc3a3
SHA12a7defd1b80394609aa783eea71c6d63b984a84a
SHA2564815dd71b3e87787f95747f46e559bad1194897f7b624a597592d56575e33af4
SHA512b4cb801268e5b7e26f3945a3e8e569e53759cf12550814980170879323674708245a19cf668fadd4cce89b5f1be59b763db4d5da065a23bac12404f8b5c67e5b
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107