Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/01/2025, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe
Resource
win10v2004-20241007-en
General
-
Target
bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe
-
Size
78KB
-
MD5
3bca59494733119c7da105bcf6926a90
-
SHA1
144dba8062069502fe3700802f752a4a7a4cd28e
-
SHA256
bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0
-
SHA512
5e7a454a7619a176bc7f08e952053270af392db32d36225c136a5a960c31d9c22f9919495daa607323fba1825e71e407c01dd08b08d9a528616cf48d89a44418
-
SSDEEP
1536:fCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQti9/N1Ag:fCHF8hASyRxvhTzXPvCbW2Ui9/F
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2212 tmpD7B9.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpD7B9.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpD7B9.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe Token: SeDebugPrivilege 2212 tmpD7B9.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2288 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 31 PID 2324 wrote to memory of 2288 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 31 PID 2324 wrote to memory of 2288 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 31 PID 2324 wrote to memory of 2288 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 31 PID 2288 wrote to memory of 1560 2288 vbc.exe 33 PID 2288 wrote to memory of 1560 2288 vbc.exe 33 PID 2288 wrote to memory of 1560 2288 vbc.exe 33 PID 2288 wrote to memory of 1560 2288 vbc.exe 33 PID 2324 wrote to memory of 2212 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 34 PID 2324 wrote to memory of 2212 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 34 PID 2324 wrote to memory of 2212 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 34 PID 2324 wrote to memory of 2212 2324 bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe"C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p8kx5ie9.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD875.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD874.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe" C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54daa6eeb107f00ecab888c5b5a76e336
SHA18a8868d4b94430155e887592729a0449946bf414
SHA256535f920fefe4c91596bef6b3b33098163a747e8ec17e2fd528813b8387de6d94
SHA51290e0116fc7fe619d29bf9f67543a072f01c40bc7570db2f7b2e4c7a64775de25a7bee99ff4f0ed58225810620f1aaae4df615facf5a0f53e673c1edb14900d26
-
Filesize
15KB
MD5e9230a02ff40aa3dbfa51abece2f6833
SHA191003a29613f996234c775fc713030ac2ad0262b
SHA2566ffd70b298039fb343f362c2aeceee4ef21e69bfaabc2c601f49b60425caa931
SHA512d96cf536ba9140619c6aa965afdca128ef93d5a3369cccdefd4573de102fac7bb19e117708decd9245e5ff0411145fdbdb4d9dfbef09981edb95ec80e4c32220
-
Filesize
266B
MD59754cb4c6dd5b78ef4f0355803ea30f8
SHA17d95afc429db8616aab052fd4aa21dbb20988fb8
SHA2563b47fa3980b04cab47098f5caf791e3bf6cae3fccf9eff0f34e70f9412f94116
SHA5127addbb75d85b23fbaa8dcc1e402571a88cc86524de789c897963f3443ce3d517ca83c9a7fae1f52ca7a3f7f943a98856a0562f56df9a81caa33637e45c2d7e09
-
Filesize
78KB
MD513387287582eac0374c0c7d4b7cfc9d0
SHA15eb27b96c70c67f5c04ea6fec7097738f79173f1
SHA2560888c0cf29c330bcac135a63d963348bfcf6ffcba149ff8566266985d46095f2
SHA51205d6e57a49528b85b41a3a460e6300355b34e4ff33bc5c858646ad514a04066653a1685c41c753132419b3588709d402adf0b7de6e7932c3fc61d9a33048153e
-
Filesize
660B
MD5b4de81e6b45e612a87e1f29875aeefcc
SHA14af22ebe63b749cdbb9a7b9542fd5d7faa4243be
SHA2563c11129d4776325496cbc2731de5e886d7745cb1115250fb5c0c0a28dc2283fb
SHA5122933b22bd201a9a1a014b8b1d44f85ede7ae18d3ad5f936a60cec56209e7de5b19f7438a3d8cf42cbb8914f55d5337a0e127c7e5c29a497aaa526f9c4e700979
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c