Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
Resource
win10v2004-20241007-en
General
-
Target
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe
-
Size
78KB
-
MD5
66020e028ac3694a7acaa956b628cb40
-
SHA1
7bb256e3fc795c3f656dec60a0bad7f51b29b943
-
SHA256
55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3
-
SHA512
a4c827be2a3a3ccd6c11ec6dd32e9636f7f07bb27fa171566c07b089df699dc4edd68bedc8e68784a91d0b2e555f5fb60af512a0e3510ed5f9a7b3a01397ecae
-
SSDEEP
1536:vtPWV5j4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQty6P9/l2MC1jT:VPWV5jASyRxvhTzXPvCbW2U39/l2ME
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe -
Deletes itself 1 IoCs
pid Process 1712 tmpA0F3.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 1712 tmpA0F3.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpA0F3.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA0F3.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1756 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe Token: SeDebugPrivilege 1712 tmpA0F3.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1756 wrote to memory of 4996 1756 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 83 PID 1756 wrote to memory of 4996 1756 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 83 PID 1756 wrote to memory of 4996 1756 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 83 PID 4996 wrote to memory of 4212 4996 vbc.exe 85 PID 4996 wrote to memory of 4212 4996 vbc.exe 85 PID 4996 wrote to memory of 4212 4996 vbc.exe 85 PID 1756 wrote to memory of 1712 1756 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 86 PID 1756 wrote to memory of 1712 1756 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 86 PID 1756 wrote to memory of 1712 1756 55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe"C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hcfxuxii.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA325.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7101DE70CEE14EB29874271CA48ED5D.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA0F3.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA0F3.tmp.exe" C:\Users\Admin\AppData\Local\Temp\55096d039cf9ae68d27a8bf5b25b7cfff65e18a0e4a4f2342593d489cf27a8d3N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD540df623f0aee0a1adeef0efebf00eda0
SHA16691e478ca1b36b7c2f9574c2a744ef969b21f81
SHA256244d47ba012c82079467f76069954c90b57a0533ae35499f4340bb5f557187d1
SHA512fbc7afa2c001efa45ea01f6df68e2e5c6fbf23a624dd1c7d90458c6bc62670aee5c5488a26411994a63c27e4029d28b4411428cce282154dddd7c60658d0d5b9
-
Filesize
14KB
MD54f99c5e23c9d151b41c99097e6095fb2
SHA1d3f15284cf72e776617b1edb24962e00d4c3b382
SHA256dfd0d5ccf82f71b35ea6358bdd9a262b33c150f74534e0fe8e0a752ed0cba2a7
SHA512bef6bd207077a95ac475566ccf7b616862c6c27126f38db409749e8a74365781b0675eeed6f4be8e15ccd54ba189247a2c79441d690b2b41944df3e88d644999
-
Filesize
266B
MD5b56d9046da010e44686951db62601ca1
SHA1b3c202781c64ce1d1a8ab77a47e3b6ba0d8c1643
SHA256e4436f81174e66b1b4e08e8fbcad98625434c12f9fbc65d19cc3658bff5ca514
SHA51225b21697512203f2d7a5c4868eeb193f3c91f98c9b6c337044793dd2d8045702e9a773699d1a354c9036fe778bfee5320d3144d1e47144059a119a1f99eab123
-
Filesize
78KB
MD5eb26dceec1da5f8d4817895794cfecaa
SHA17876643c0992f026d97c29bb94c5772d51aeec40
SHA2568676878f4d7998830b161bcbe274824db16a4a48c59f14cc2029cefef6514d62
SHA5126739c3c468692117ae079d1040f6821c6ae0ebd07507071b578ef36f14fbd6f3d34673d04be009e3df07cfad99abf1fec05e2c6a180906ec415cc6653191c4e1
-
Filesize
660B
MD56df52ec0089222d1a56d72ff49ffdefa
SHA1c36e4f2e2728be9d803fef69b2b32965bdc27808
SHA2563927cd43e825c1fa6964e910fceea310c10d922005a65e83dbf6fca481d7fee9
SHA512f0d0ca352db3251b339a86159210b78a55716528d98cdb31491a246f4f1c8d39008fca46fd57be36583940b5b48eba461f5d895690e1d50a345262e5cbcad33a
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c