Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2025, 11:49

General

  • Target

    JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe

  • Size

    512KB

  • MD5

    7986dfc5ba3a34272aad6b1128d04462

  • SHA1

    1f26a98dafa6d33c09b57cc719df618eabe8d830

  • SHA256

    cf0a727b7407810bf9200e55c35569c2816e5f9213dcbc18c778955b5d69dfe8

  • SHA512

    4582fd8c31f977faf3c815723f77b95406e67de9d5405b20cb8e35586b3cf9deb0de1299779160a88274cc711a82d88dfe235d2e3ef9ea496a336ee6fc4dea80

  • SSDEEP

    12288:Ih1Lk70TnvjcM5ez2rZEo2J1nPIs9iQLsRZYqhipVgtPp:Uk70TrcUTrV2J1nWQOce

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\s6y7gpop.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD96F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD96E.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2780
    • C:\Users\Admin\AppData\Local\Temp\tmpCFDD.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpCFDD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD96F.tmp

    Filesize

    1KB

    MD5

    12619c1dbd8c09819c764fc4c17ee243

    SHA1

    ec03da46669dbf87dcd699f9eb1edffc71510eba

    SHA256

    f931a804fa9d295fd2e3d186a58841cb4553626b134f6c45f36255f5a3f1b8e3

    SHA512

    43e478870b73e9f401b5440cf2ccf8014007fcd5790219a5c201e0794b0f0baeaf3d1a6c6e07ef880c03f4fc95a15542b361773ba6bf059d67388a29edea8443

  • C:\Users\Admin\AppData\Local\Temp\s6y7gpop.0.vb

    Filesize

    128KB

    MD5

    0edc22ed8471e29fc208d3a05f922d26

    SHA1

    207b2fd8131cf0614f4c5dc53af5d98287022007

    SHA256

    04c74b8ffdd80898c513ad4118e073fce30d26f6b4e665dbde15e88769b3829d

    SHA512

    1ea2eb7a15682f813676ae64c4a67ef1c832fea766c943e75f5bdb78c5c1ba9e2348509f53269d93b15d976c7a8b7ddc4fbfa4be8d999ceb1dda768996b1d2dc

  • C:\Users\Admin\AppData\Local\Temp\s6y7gpop.cmdline

    Filesize

    266B

    MD5

    ad05ed1c90d777876072a897d9269a90

    SHA1

    6a5b3cc76f21a47b5ce78f4af854c850efd47d7d

    SHA256

    903d1a2644ed754bde0bf58dcbf9f48693e5ef87fe0fef5ca05f0eeaf8f234d3

    SHA512

    5887bc0257aeec2e82f2935d7d42036a31176b37ef694e6a8f5bd26607147b9d539183310b531bf10467a226febff65f6ac0641eb3d22d88b5c33e1521132949

  • C:\Users\Admin\AppData\Local\Temp\tmpCFDD.tmp.exe

    Filesize

    121KB

    MD5

    f991a64f7d90f77813d74074d11e1700

    SHA1

    57dfb5e99f8f283cbb6863835b5371c50f201fe4

    SHA256

    f86c8f4dd4cf00f2f49e0d9cd5c90c15f42679875f708603d376a97bd519fc39

    SHA512

    ca0d754f2e9c0960cb5031d71c293534923bc99adbd4ba412c36bc3c053fed6f9f57b832becc7bdd35f45e4d19164bbbabf541ffc3058ba35c7854edbe906d43

  • C:\Users\Admin\AppData\Local\Temp\vbcD96E.tmp

    Filesize

    660B

    MD5

    4277373bf110eef660e3be6eb0aa6cb2

    SHA1

    452fae370a2ef086614d4608eed38925a8eca633

    SHA256

    ce857e989d315ddc81d6a221aeaa45a072e80b0550c9589435c924e59c874dad

    SHA512

    4b159eff4ef422b393847ef490f88f3cc0388d0c333ab629c05fc03b8a4d47ef5ac5522cc3a45a0b32aaf9bdf4ee1f0d6b1124b4f4831785b41c3cba6184288e

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    b8fb7009403489ea2ceda4e5abb969aa

    SHA1

    caeeda2b652f02370501de51b599dc82b89a996b

    SHA256

    340012732dc6952273a5892d09869d171235b6221d0f6773b31c0df5a2b9e8d4

    SHA512

    9595f829f9354c9851fc4f280ecb642bb47881e0b920a031409f58e3cbbe0e6e881dc10a98a8d48b7459130f005ee1d00917f6a826ae9ae0bbe08ba9dafeb407

  • memory/564-427-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/564-417-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-63-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-53-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-21-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-19-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-17-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-13-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-11-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-9-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-7-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-5-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-29-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-33-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-66-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-67-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-0-0x0000000074AB1000-0x0000000074AB2000-memory.dmp

    Filesize

    4KB

  • memory/2064-61-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-59-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-57-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-55-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-23-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-51-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-49-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-47-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-45-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-43-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-41-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-39-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-37-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-35-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-25-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-27-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-31-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-15-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-4-0x00000000045F0000-0x000000000468D000-memory.dmp

    Filesize

    628KB

  • memory/2064-3-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-2-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-1-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-433-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB