Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2025, 03:14

General

  • Target

    bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe

  • Size

    78KB

  • MD5

    3bca59494733119c7da105bcf6926a90

  • SHA1

    144dba8062069502fe3700802f752a4a7a4cd28e

  • SHA256

    bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0

  • SHA512

    5e7a454a7619a176bc7f08e952053270af392db32d36225c136a5a960c31d9c22f9919495daa607323fba1825e71e407c01dd08b08d9a528616cf48d89a44418

  • SSDEEP

    1536:fCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQti9/N1Ag:fCHF8hASyRxvhTzXPvCbW2Ui9/F

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p8kx5ie9.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD875.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD874.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1560
    • C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe" C:\Users\Admin\AppData\Local\Temp\bac3ee291ecd9f6af92c7005c1bb25a5f8e9ec0c0b7d0d400d06112247e786d0N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD875.tmp

    Filesize

    1KB

    MD5

    4daa6eeb107f00ecab888c5b5a76e336

    SHA1

    8a8868d4b94430155e887592729a0449946bf414

    SHA256

    535f920fefe4c91596bef6b3b33098163a747e8ec17e2fd528813b8387de6d94

    SHA512

    90e0116fc7fe619d29bf9f67543a072f01c40bc7570db2f7b2e4c7a64775de25a7bee99ff4f0ed58225810620f1aaae4df615facf5a0f53e673c1edb14900d26

  • C:\Users\Admin\AppData\Local\Temp\p8kx5ie9.0.vb

    Filesize

    15KB

    MD5

    e9230a02ff40aa3dbfa51abece2f6833

    SHA1

    91003a29613f996234c775fc713030ac2ad0262b

    SHA256

    6ffd70b298039fb343f362c2aeceee4ef21e69bfaabc2c601f49b60425caa931

    SHA512

    d96cf536ba9140619c6aa965afdca128ef93d5a3369cccdefd4573de102fac7bb19e117708decd9245e5ff0411145fdbdb4d9dfbef09981edb95ec80e4c32220

  • C:\Users\Admin\AppData\Local\Temp\p8kx5ie9.cmdline

    Filesize

    266B

    MD5

    9754cb4c6dd5b78ef4f0355803ea30f8

    SHA1

    7d95afc429db8616aab052fd4aa21dbb20988fb8

    SHA256

    3b47fa3980b04cab47098f5caf791e3bf6cae3fccf9eff0f34e70f9412f94116

    SHA512

    7addbb75d85b23fbaa8dcc1e402571a88cc86524de789c897963f3443ce3d517ca83c9a7fae1f52ca7a3f7f943a98856a0562f56df9a81caa33637e45c2d7e09

  • C:\Users\Admin\AppData\Local\Temp\tmpD7B9.tmp.exe

    Filesize

    78KB

    MD5

    13387287582eac0374c0c7d4b7cfc9d0

    SHA1

    5eb27b96c70c67f5c04ea6fec7097738f79173f1

    SHA256

    0888c0cf29c330bcac135a63d963348bfcf6ffcba149ff8566266985d46095f2

    SHA512

    05d6e57a49528b85b41a3a460e6300355b34e4ff33bc5c858646ad514a04066653a1685c41c753132419b3588709d402adf0b7de6e7932c3fc61d9a33048153e

  • C:\Users\Admin\AppData\Local\Temp\vbcD874.tmp

    Filesize

    660B

    MD5

    b4de81e6b45e612a87e1f29875aeefcc

    SHA1

    4af22ebe63b749cdbb9a7b9542fd5d7faa4243be

    SHA256

    3c11129d4776325496cbc2731de5e886d7745cb1115250fb5c0c0a28dc2283fb

    SHA512

    2933b22bd201a9a1a014b8b1d44f85ede7ae18d3ad5f936a60cec56209e7de5b19f7438a3d8cf42cbb8914f55d5337a0e127c7e5c29a497aaa526f9c4e700979

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2288-8-0x0000000074120000-0x00000000746CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2288-18-0x0000000074120000-0x00000000746CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2324-0-0x0000000074121000-0x0000000074122000-memory.dmp

    Filesize

    4KB

  • memory/2324-1-0x0000000074120000-0x00000000746CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2324-2-0x0000000074120000-0x00000000746CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2324-24-0x0000000074120000-0x00000000746CB000-memory.dmp

    Filesize

    5.7MB