Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2025, 06:42

General

  • Target

    9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe

  • Size

    78KB

  • MD5

    0217b9eea299591e3ec04b407460b196

  • SHA1

    5c94b5c4c23790df7786521952dccc59275d4a0a

  • SHA256

    9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc

  • SHA512

    68adca67136a41482b92f4fa795d5068d133350aa12a2b4cd13557f40e8401fae9c98666a16a6c42887a2556ce2477db4859a1896ad81ec6f4067f8bd4edcfb0

  • SSDEEP

    1536:QRWtHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtRD9/p1re:QRWtHF8hASyRxvhTzXPvCbW2URD9/m

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe
    "C:\Users\Admin\AppData\Local\Temp\9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ci3tp8k7.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD49E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD49D.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1812
    • C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp.exe" C:\Users\Admin\AppData\Local\Temp\9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD49E.tmp

    Filesize

    1KB

    MD5

    0a9bed0d2f5a731489da8bc1d9b48ad1

    SHA1

    4ac18e8fcf95601520b8313e67ad55c1089be664

    SHA256

    afc07ca9afc4cd1cf3bb7d1bf06a095499f016bd66ffd91029e982b889b06e6d

    SHA512

    0697b4f44917f36a316ab1e6097a2bacbb1b4ecee0a8360fc19538ddefd3cdc27cf5a37eb75c0ea6360b08e6cfdfba76ce32515bef61948ec1860edfbe6412b0

  • C:\Users\Admin\AppData\Local\Temp\ci3tp8k7.0.vb

    Filesize

    15KB

    MD5

    9a167da65189497d5f5d373da81e011a

    SHA1

    b3113a3e636d2fe857358e281eea038a0e73ef04

    SHA256

    9e64b85611ac0787a3675a4682800b1f45207e5bb10c37db8e1560de9ab2dc84

    SHA512

    4e5aaace36deccddb6264baa4b6974d93d2ab31c43ee49feb81515fb1619223e486cef5ae70b7c23b378badca0dace212a780881f5ada885bc0920c9e18193c6

  • C:\Users\Admin\AppData\Local\Temp\ci3tp8k7.cmdline

    Filesize

    266B

    MD5

    745e204d17f942dddd1d6f76d8d5676f

    SHA1

    35ddcf9190c25b57d48d3567ddf588cb8be33b44

    SHA256

    93bbb519c47602ba50c14f4e98297a19e2dca43ab4d3cc5074c4bea47f4d5322

    SHA512

    8845769d9386233ccf1db732913776793ad12e51ee9cdb3d17c349a56853599830b61bff2c6912792eb210200f2b4010229047569563ad1f37475fa7b8af4cb9

  • C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp.exe

    Filesize

    78KB

    MD5

    a1ff52737e3cc7070fe4b1b073d1a5cf

    SHA1

    6eca647872c133822b4db2c1fb7b64f2ddfd7f36

    SHA256

    815c68c710c16c0bd3ed17cdc8a31601260051997e2c30f91b4c45cc7d896a3d

    SHA512

    0f0c86efaacd3ddd54300cdae16c090339f742104681750d08683727ba1f641a24257edf2184a362a4ccbd30b89c1a7085e2a2ae7ffbac545ef756367cfb3a23

  • C:\Users\Admin\AppData\Local\Temp\vbcD49D.tmp

    Filesize

    660B

    MD5

    13b18c2e83729a30356a97ee58a7a108

    SHA1

    66f81a5284acf71c651224992137ad4b592165a8

    SHA256

    c3e3df1e7b2e0d750c3aa06dbb814bb82371852b414a4cacbe7e929f294ec7de

    SHA512

    38e1095b3ccdf427a58147cef3cee9eef3a3647b94b8916a07d73d571cd130ea814b0313a0ec47ab0e447074eaa689ccea843f209df1791965fcf6aaa027acc7

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2356-8-0x0000000074B50000-0x00000000750FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2356-18-0x0000000074B50000-0x00000000750FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-0-0x0000000074B51000-0x0000000074B52000-memory.dmp

    Filesize

    4KB

  • memory/2492-1-0x0000000074B50000-0x00000000750FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-2-0x0000000074B50000-0x00000000750FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-24-0x0000000074B50000-0x00000000750FB000-memory.dmp

    Filesize

    5.7MB