Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
Resource
win10v2004-20241007-en
General
-
Target
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
-
Size
78KB
-
MD5
66020e028ac3694a7acaa956b628cb40
-
SHA1
7bb256e3fc795c3f656dec60a0bad7f51b29b943
-
SHA256
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3
-
SHA512
a4c827be2a3a3ccd6c11ec6dd32e9636f7f07bb27fa171566c07b089df699dc4edd68bedc8e68784a91d0b2e555f5fb60af512a0e3510ed5f9a7b3a01397ecae
-
SSDEEP
1536:vtPWV5j4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQty6P9/l2MC1jT:VPWV5jASyRxvhTzXPvCbW2U39/l2ME
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2752 tmp9434.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp9434.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9434.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe Token: SeDebugPrivilege 2752 tmp9434.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2396 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 30 PID 1076 wrote to memory of 2396 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 30 PID 1076 wrote to memory of 2396 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 30 PID 1076 wrote to memory of 2396 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 30 PID 2396 wrote to memory of 2800 2396 vbc.exe 32 PID 2396 wrote to memory of 2800 2396 vbc.exe 32 PID 2396 wrote to memory of 2800 2396 vbc.exe 32 PID 2396 wrote to memory of 2800 2396 vbc.exe 32 PID 1076 wrote to memory of 2752 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 33 PID 1076 wrote to memory of 2752 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 33 PID 1076 wrote to memory of 2752 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 33 PID 1076 wrote to memory of 2752 1076 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe"C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hyad6voe.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES953E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc953D.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9434.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9434.tmp.exe" C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bda12f2a24ab826d08954297ede2a9b6
SHA1add171ca75d71b355e2f7aa0f3d70e06394e854a
SHA256c52f5eaa2a3d70ad752fbcb2cf5b4483a4178cc9c42012f49e541115aa98c4d9
SHA5128152bbdb6ff7c9cab730a315520c1c48a5d90b0b4e53885f05b9968607abfeaf33f8285aa7c65dd3b29baf017bacb4a943b2b1d08c86aa168a5e529776e5e7ed
-
Filesize
14KB
MD52cb97f9d1467c28473eb48bd8e702704
SHA1798d2eb96b82838bf6e7bb9e93cd62e016f7d75c
SHA2560a005842f93b777c42224b5c96de468333b4537280e1df01a842dfd9c13fb704
SHA512d39eb43746cc296633ab21d0fce3f0fd32eb0af9aa7b31b5fa20d200316cf63b0ab7b4ac226128eb51181aced985612efa2b1b81a59da5beeef809c5d878f94b
-
Filesize
266B
MD5c6b243a4f8a009515b34bcbbfc0bb607
SHA1a3c882f5e6eb4b19b9ac3c9118eb4d9bf6ebf2db
SHA2566d89335e98f4dd2d5679c00800ff8601c5add526883e7605243bd2b5312e97f9
SHA512909a2569edd7332e504c01cddba47059b1f2bbe740deb790d37d8594ec2c086c7621a80583f9fe5734eff055d791c1597cd1732d33d56880ae9ec1f0474f1dcc
-
Filesize
78KB
MD514f0356abc648cc3437783070a5ea0fc
SHA11a0ab268d30c7a32f9119903227bfade20592efb
SHA256c4459b5e761ac3f6fdb5a044f811d686255d466849b86acb23b354ded16b5398
SHA512201c6afea68c0333e5b7422d421667a0da6ac1582942a38fd44ce0982f0a2b8fb201a1ca6005bf570789779dd34f9e49d9e343826dc00912f954ba7de913b7ae
-
Filesize
660B
MD5ec3d91c5fac55256cf82bef967d78b94
SHA178a03a0d0f53a75f96ccd3bf0aa60fa4184377b7
SHA2566c99e6e6a1f7f2c52b127ac531726797bc58733115d7ab3ff949fa8c8f5eab30
SHA51290c407e0a668ad683121870e051231bc671d502fcddb9fc9ee0b95ff759664b1868084daaa1d6f0f9ad1439c8965f19a673c91f35f12caf8b2dd811ec791b95d
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c