Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2024, 08:11

General

  • Target

    55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe

  • Size

    78KB

  • MD5

    66020e028ac3694a7acaa956b628cb40

  • SHA1

    7bb256e3fc795c3f656dec60a0bad7f51b29b943

  • SHA256

    55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3

  • SHA512

    a4c827be2a3a3ccd6c11ec6dd32e9636f7f07bb27fa171566c07b089df699dc4edd68bedc8e68784a91d0b2e555f5fb60af512a0e3510ed5f9a7b3a01397ecae

  • SSDEEP

    1536:vtPWV5j4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQty6P9/l2MC1jT:VPWV5jASyRxvhTzXPvCbW2U39/l2ME

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
    "C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hyad6voe.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES953E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc953D.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2800
    • C:\Users\Admin\AppData\Local\Temp\tmp9434.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9434.tmp.exe" C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES953E.tmp

    Filesize

    1KB

    MD5

    bda12f2a24ab826d08954297ede2a9b6

    SHA1

    add171ca75d71b355e2f7aa0f3d70e06394e854a

    SHA256

    c52f5eaa2a3d70ad752fbcb2cf5b4483a4178cc9c42012f49e541115aa98c4d9

    SHA512

    8152bbdb6ff7c9cab730a315520c1c48a5d90b0b4e53885f05b9968607abfeaf33f8285aa7c65dd3b29baf017bacb4a943b2b1d08c86aa168a5e529776e5e7ed

  • C:\Users\Admin\AppData\Local\Temp\hyad6voe.0.vb

    Filesize

    14KB

    MD5

    2cb97f9d1467c28473eb48bd8e702704

    SHA1

    798d2eb96b82838bf6e7bb9e93cd62e016f7d75c

    SHA256

    0a005842f93b777c42224b5c96de468333b4537280e1df01a842dfd9c13fb704

    SHA512

    d39eb43746cc296633ab21d0fce3f0fd32eb0af9aa7b31b5fa20d200316cf63b0ab7b4ac226128eb51181aced985612efa2b1b81a59da5beeef809c5d878f94b

  • C:\Users\Admin\AppData\Local\Temp\hyad6voe.cmdline

    Filesize

    266B

    MD5

    c6b243a4f8a009515b34bcbbfc0bb607

    SHA1

    a3c882f5e6eb4b19b9ac3c9118eb4d9bf6ebf2db

    SHA256

    6d89335e98f4dd2d5679c00800ff8601c5add526883e7605243bd2b5312e97f9

    SHA512

    909a2569edd7332e504c01cddba47059b1f2bbe740deb790d37d8594ec2c086c7621a80583f9fe5734eff055d791c1597cd1732d33d56880ae9ec1f0474f1dcc

  • C:\Users\Admin\AppData\Local\Temp\tmp9434.tmp.exe

    Filesize

    78KB

    MD5

    14f0356abc648cc3437783070a5ea0fc

    SHA1

    1a0ab268d30c7a32f9119903227bfade20592efb

    SHA256

    c4459b5e761ac3f6fdb5a044f811d686255d466849b86acb23b354ded16b5398

    SHA512

    201c6afea68c0333e5b7422d421667a0da6ac1582942a38fd44ce0982f0a2b8fb201a1ca6005bf570789779dd34f9e49d9e343826dc00912f954ba7de913b7ae

  • C:\Users\Admin\AppData\Local\Temp\vbc953D.tmp

    Filesize

    660B

    MD5

    ec3d91c5fac55256cf82bef967d78b94

    SHA1

    78a03a0d0f53a75f96ccd3bf0aa60fa4184377b7

    SHA256

    6c99e6e6a1f7f2c52b127ac531726797bc58733115d7ab3ff949fa8c8f5eab30

    SHA512

    90c407e0a668ad683121870e051231bc671d502fcddb9fc9ee0b95ff759664b1868084daaa1d6f0f9ad1439c8965f19a673c91f35f12caf8b2dd811ec791b95d

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/1076-0-0x0000000074D51000-0x0000000074D52000-memory.dmp

    Filesize

    4KB

  • memory/1076-1-0x0000000074D50000-0x00000000752FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1076-2-0x0000000074D50000-0x00000000752FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1076-24-0x0000000074D50000-0x00000000752FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2396-8-0x0000000074D50000-0x00000000752FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2396-18-0x0000000074D50000-0x00000000752FB000-memory.dmp

    Filesize

    5.7MB