Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2025, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe
Resource
win10v2004-20241007-en
General
-
Target
86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe
-
Size
78KB
-
MD5
5fa7c9bf57225c49df47e8c39b661e7f
-
SHA1
611b273a13eb9136ef73dda870d890b822e7f4dd
-
SHA256
86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68
-
SHA512
635b3b3610c5764c9693aebb2a237a2a7ee7a09c0f2252536169c892127d89af9f7249fc576f3ab43c4debfe9a8bad50089fdfa9d8aa98c61101ed210a81705f
-
SSDEEP
1536:KPWtHFo6M7t/vZv0kH9gDDtWzYCnJPeoYrGQtq9/61wF:KPWtHFonh/l0Y9MDYrm7q9/f
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe -
Deletes itself 1 IoCs
pid Process 832 tmp92F9.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 832 tmp92F9.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmp92F9.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp92F9.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe Token: SeDebugPrivilege 832 tmp92F9.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1928 2240 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe 83 PID 2240 wrote to memory of 1928 2240 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe 83 PID 2240 wrote to memory of 1928 2240 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe 83 PID 1928 wrote to memory of 4032 1928 vbc.exe 85 PID 1928 wrote to memory of 4032 1928 vbc.exe 85 PID 1928 wrote to memory of 4032 1928 vbc.exe 85 PID 2240 wrote to memory of 832 2240 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe 86 PID 2240 wrote to memory of 832 2240 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe 86 PID 2240 wrote to memory of 832 2240 86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe"C:\Users\Admin\AppData\Local\Temp\86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\38gyznra.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES94AE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc319C39DB204BE0A7ACC133043DE77.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp92F9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp92F9.tmp.exe" C:\Users\Admin\AppData\Local\Temp\86e3c05bdb41130266949b3d80b9bba58660c84db8a0d79012fa023d6f7f6a68.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5300d3884bb4e68b096f839f2c007c155
SHA14deb075a02700c2dfbc1a071f18306a1b8f9cf30
SHA256d9b0b89d2293f2080eda97edeff3a902ae4a73a11a68b469b57f4081e98a27d2
SHA512211eccfe4a8a347900ffb5bc60a051036e8863453cb5f4bb1700fd2952c261bf94e9e187c86c6a1f811803a2750eb2409442a98519ff1edc70cc73a0709d917e
-
Filesize
266B
MD538cf2d3214b3448b93841b654bbd5ae8
SHA114ac3a1da6a3276a487ec725da6ea5c17b8e883d
SHA256313aacc01d62e03d57dbbddaf3f3254923a05257049fd34e5eaf6f0a29601353
SHA5123d175844c755283b81352739446a63760bb2d687fe54a9057b70076013064333d8032eb1cf710a4e206d4342410fe190054f936fd56fbf4615ef34ae1cf94ee1
-
Filesize
1KB
MD54525d6b58ae092bf6973df29e70345ca
SHA1d18c4b20aab60de77392823e11460170b5decf00
SHA25648b88fae76f7d7975c1b661407eaace817e94ab23a854a9c2a6dfde8c3971eda
SHA512a3ac2176659a0e533de6f1014a1906a57b872a69862e16c34ad2c3dcfd1ce2c79f1a23041df62c4ae262c8339b810d457481a1b4a92759846d6215b375594390
-
Filesize
78KB
MD50d998c06a0e10779144dfcd0986a60c9
SHA1365af14cb9770489a454d356af8d5eb5b880ed30
SHA25659b79cf6a5a1d642996eea9d8b7d1145e1110308ea0b542e88226186565e0d8e
SHA512590fb25c16e695d2cfc5a09551c3a43a918ff48d4badb66e02955a5ce7e9d25bce25d630c4803fd28063e88984a9fb99f87c5a159f219ca59d5ce0d52efb5b88
-
Filesize
660B
MD5b1b5ceeb42de362d5b1ca4718561c58d
SHA1f60ab61e6ebb508cfd7be3196990c1838cf2ef18
SHA25601fc13bb4e9a42dbbeb500e06525bcb6a702e14cd641b41cfd544a48676cc523
SHA51214c9096a92e4a77b314d38057c28affef313e5e5ce02e9f159c13a3d61f3d4ff4b7a621611fedbefbfe08f2147f6631bc4ad332332e98197b3db187a2c95fdd0
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d