Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2025, 21:43 UTC

General

  • Target

    26303b3203438716d2073688a6858ebe01dd731ecb0e3c72d4299913a02480d9.exe

  • Size

    78KB

  • MD5

    790d0326246a8ab6fc4adb98ec27ea4a

  • SHA1

    70816ddf9fded00157b9fda700e0c1ab36f230f4

  • SHA256

    26303b3203438716d2073688a6858ebe01dd731ecb0e3c72d4299913a02480d9

  • SHA512

    973902ccb7693b191e4936dbbae44c6a56f52bf1ced9c4960905b3a783fda1bb6c0636febf82bb69c9556ec5143ce9be7d158fa53b072e4b7718e69e3369cad5

  • SSDEEP

    1536:zWtHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtev9/O1NN:zWtHF8hASyRxvhTzXPvCbW2Uev9/o

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26303b3203438716d2073688a6858ebe01dd731ecb0e3c72d4299913a02480d9.exe
    "C:\Users\Admin\AppData\Local\Temp\26303b3203438716d2073688a6858ebe01dd731ecb0e3c72d4299913a02480d9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zvinzssp.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE5BE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE5BD.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2652
    • C:\Users\Admin\AppData\Local\Temp\tmpE4F2.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpE4F2.tmp.exe" C:\Users\Admin\AppData\Local\Temp\26303b3203438716d2073688a6858ebe01dd731ecb0e3c72d4299913a02480d9.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2796

Network

  • flag-us
    DNS
    bejnz.com
    tmpE4F2.tmp.exe
    Remote address:
    8.8.8.8:53
    Request
    bejnz.com
    IN A
    Response
    bejnz.com
    IN A
    44.221.84.105
  • flag-us
    GET
    http://bejnz.com/IP.php
    tmpE4F2.tmp.exe
    Remote address:
    44.221.84.105:80
    Request
    GET /IP.php HTTP/1.1
    Host: bejnz.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Wed, 15 Jan 2025 21:44:02 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=d80b7102165545a9f4f2766b8f3c4e90|181.215.176.83|1736977442|1736977442|0|1|0; path=/; domain=.bejnz.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
  • flag-us
    DNS
    rwkeith.no-ip.org
    tmpE4F2.tmp.exe
    Remote address:
    8.8.8.8:53
    Request
    rwkeith.no-ip.org
    IN A
    Response
  • flag-us
    GET
    http://bejnz.com/IP.php
    tmpE4F2.tmp.exe
    Remote address:
    44.221.84.105:80
    Request
    GET /IP.php HTTP/1.1
    Host: bejnz.com
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Wed, 15 Jan 2025 21:44:04 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=4eea32f09e0f7276be49c45b917a9747|181.215.176.83|1736977444|1736977444|0|1|0; path=/; domain=.bejnz.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
  • flag-us
    GET
    http://bejnz.com/IP.php
    tmpE4F2.tmp.exe
    Remote address:
    44.221.84.105:80
    Request
    GET /IP.php HTTP/1.1
    Host: bejnz.com
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Wed, 15 Jan 2025 21:44:05 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=b66a6d13404ab78c5f5b37cf4b25d494|181.215.176.83|1736977445|1736977445|0|1|0; path=/; domain=.bejnz.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
  • flag-us
    GET
    http://bejnz.com/IP.php
    tmpE4F2.tmp.exe
    Remote address:
    44.221.84.105:80
    Request
    GET /IP.php HTTP/1.1
    Host: bejnz.com
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Wed, 15 Jan 2025 21:44:06 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=736a563a2be9b824df769f157bc217ea|181.215.176.83|1736977446|1736977446|0|1|0; path=/; domain=.bejnz.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
  • flag-us
    GET
    http://bejnz.com/IP.php
    tmpE4F2.tmp.exe
    Remote address:
    44.221.84.105:80
    Request
    GET /IP.php HTTP/1.1
    Host: bejnz.com
  • 44.221.84.105:80
    http://bejnz.com/IP.php
    http
    tmpE4F2.tmp.exe
    341 B
    625 B
    6
    5

    HTTP Request

    GET http://bejnz.com/IP.php

    HTTP Response

    200
  • 44.221.84.105:80
    http://bejnz.com/IP.php
    http
    tmpE4F2.tmp.exe
    271 B
    625 B
    5
    5

    HTTP Request

    GET http://bejnz.com/IP.php

    HTTP Response

    200
  • 44.221.84.105:80
    http://bejnz.com/IP.php
    http
    tmpE4F2.tmp.exe
    271 B
    625 B
    5
    5

    HTTP Request

    GET http://bejnz.com/IP.php

    HTTP Response

    200
  • 44.221.84.105:80
    http://bejnz.com/IP.php
    http
    tmpE4F2.tmp.exe
    271 B
    625 B
    5
    5

    HTTP Request

    GET http://bejnz.com/IP.php

    HTTP Response

    200
  • 44.221.84.105:80
    http://bejnz.com/IP.php
    http
    tmpE4F2.tmp.exe
    1.0kB
    260 B
    15
    5

    HTTP Request

    GET http://bejnz.com/IP.php
  • 44.221.84.105:80
    bejnz.com
    tmpE4F2.tmp.exe
    296 B
    6
  • 44.221.84.105:80
    bejnz.com
    tmpE4F2.tmp.exe
    152 B
    3
  • 44.221.84.105:80
    bejnz.com
    tmpE4F2.tmp.exe
    152 B
    3
  • 44.221.84.105:80
    bejnz.com
    tmpE4F2.tmp.exe
    152 B
    3
  • 8.8.8.8:53
    bejnz.com
    dns
    tmpE4F2.tmp.exe
    55 B
    71 B
    1
    1

    DNS Request

    bejnz.com

    DNS Response

    44.221.84.105

  • 8.8.8.8:53
    rwkeith.no-ip.org
    dns
    tmpE4F2.tmp.exe
    63 B
    123 B
    1
    1

    DNS Request

    rwkeith.no-ip.org

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESE5BE.tmp

    Filesize

    1KB

    MD5

    adb2dc4a2ca187a418dca9e3cc3ec0c2

    SHA1

    406ccde6b74447e7b319603cc12104f7ba96546e

    SHA256

    2156f5d3f8f6465bf7097312bdd224704490875bc6ef333033fe8f80bd85a8dd

    SHA512

    365af6534ee8337a32c784c65601e03f541452c7dc2a7f117bd4b90a5157dd537f05cb475fee383d1fcdff257dd5df960010c43f88e37b8182d633cf19bd2bb8

  • C:\Users\Admin\AppData\Local\Temp\tmpE4F2.tmp.exe

    Filesize

    78KB

    MD5

    aa71aeba6836ac5f19f9efc81363c609

    SHA1

    78a05ae52cfcd198542e4d5f6649e54545605b8a

    SHA256

    2c6388826e1b109beaaacd49c8bb9e8a08e64ceb1bf85ccd37b70b1ae672a05c

    SHA512

    dc057905ae805eb55538628e7c341605a5e5547e2fd8a49aefe5b51bfbca5011c78c375d9d516e6b14c52ab00bf8bc92d5b0a4d08bbceeb083aaea7d8d833ad1

  • C:\Users\Admin\AppData\Local\Temp\vbcE5BD.tmp

    Filesize

    660B

    MD5

    1a52543ba6f45779be0ae572aa3dcd16

    SHA1

    da15ca69307a0780c6d26d47f4d602f7775ad6ad

    SHA256

    1eceef59489c3bf242168aa6d9e2f0e0168437b6687ebce3b36821b5b2bc1d32

    SHA512

    b4beaab9ab5ade2ff3904f31ab2ffde5ef54fbe53b987351effed5e3a1a5aa2bc96b408904d4cdf9c23b39045803b3fc7b3afef8eda1c0ecea93ebe1a60834ff

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • C:\Users\Admin\AppData\Local\Temp\zvinzssp.0.vb

    Filesize

    15KB

    MD5

    55ffc22e0a3b0179f9519d6a2de0cbb9

    SHA1

    daf204c74508dbb1614a9eaeb92f2c2d3ad4877d

    SHA256

    e197605f73a3838bc0698a9b5f2282036bde3e59ab87d723e0f7f4595d7f26bb

    SHA512

    bdd74a03daeb43fa375f8c4bfc7351cb3923c4e37dcaafc5857e89889148beca09ae13078e81d5648c2615f66c53d928dfa394498407703896b8e0de537ebcb5

  • C:\Users\Admin\AppData\Local\Temp\zvinzssp.cmdline

    Filesize

    266B

    MD5

    df14939c0f87b155cf6af8fc35389774

    SHA1

    374de41139634ef649156605fa7ec9f15158835d

    SHA256

    cd4f838369e883c8cd55655dcc28736ca0b8ecb91bcdd9a6413181ed456becce

    SHA512

    74ecffd363a2dc2065e5fb82ed2e2e89398cb047aa34b51b3794ec95baa9e19ee658b86ec7636204d07bb4ed9f7403e6bf2ca654f25a6859f817eafad908f515

  • memory/1732-0-0x0000000074571000-0x0000000074572000-memory.dmp

    Filesize

    4KB

  • memory/1732-1-0x0000000074570000-0x0000000074B1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1732-2-0x0000000074570000-0x0000000074B1B000-memory.dmp

    Filesize

    5.7MB

  • memory/1732-24-0x0000000074570000-0x0000000074B1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-8-0x0000000074570000-0x0000000074B1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-18-0x0000000074570000-0x0000000074B1B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.