Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe
Resource
win10v2004-20241007-en
General
-
Target
9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe
-
Size
78KB
-
MD5
0217b9eea299591e3ec04b407460b196
-
SHA1
5c94b5c4c23790df7786521952dccc59275d4a0a
-
SHA256
9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc
-
SHA512
68adca67136a41482b92f4fa795d5068d133350aa12a2b4cd13557f40e8401fae9c98666a16a6c42887a2556ce2477db4859a1896ad81ec6f4067f8bd4edcfb0
-
SSDEEP
1536:QRWtHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtRD9/p1re:QRWtHF8hASyRxvhTzXPvCbW2URD9/m
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2660 tmpD394.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpD394.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpD394.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe Token: SeDebugPrivilege 2660 tmpD394.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2356 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 31 PID 2492 wrote to memory of 2356 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 31 PID 2492 wrote to memory of 2356 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 31 PID 2492 wrote to memory of 2356 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 31 PID 2356 wrote to memory of 1812 2356 vbc.exe 33 PID 2356 wrote to memory of 1812 2356 vbc.exe 33 PID 2356 wrote to memory of 1812 2356 vbc.exe 33 PID 2356 wrote to memory of 1812 2356 vbc.exe 33 PID 2492 wrote to memory of 2660 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 34 PID 2492 wrote to memory of 2660 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 34 PID 2492 wrote to memory of 2660 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 34 PID 2492 wrote to memory of 2660 2492 9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe"C:\Users\Admin\AppData\Local\Temp\9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ci3tp8k7.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD49E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD49D.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp.exe" C:\Users\Admin\AppData\Local\Temp\9158094219ff5ee41bce5411174f1f10e03bbef565b4b8541395c2dbb362cdcc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50a9bed0d2f5a731489da8bc1d9b48ad1
SHA14ac18e8fcf95601520b8313e67ad55c1089be664
SHA256afc07ca9afc4cd1cf3bb7d1bf06a095499f016bd66ffd91029e982b889b06e6d
SHA5120697b4f44917f36a316ab1e6097a2bacbb1b4ecee0a8360fc19538ddefd3cdc27cf5a37eb75c0ea6360b08e6cfdfba76ce32515bef61948ec1860edfbe6412b0
-
Filesize
15KB
MD59a167da65189497d5f5d373da81e011a
SHA1b3113a3e636d2fe857358e281eea038a0e73ef04
SHA2569e64b85611ac0787a3675a4682800b1f45207e5bb10c37db8e1560de9ab2dc84
SHA5124e5aaace36deccddb6264baa4b6974d93d2ab31c43ee49feb81515fb1619223e486cef5ae70b7c23b378badca0dace212a780881f5ada885bc0920c9e18193c6
-
Filesize
266B
MD5745e204d17f942dddd1d6f76d8d5676f
SHA135ddcf9190c25b57d48d3567ddf588cb8be33b44
SHA25693bbb519c47602ba50c14f4e98297a19e2dca43ab4d3cc5074c4bea47f4d5322
SHA5128845769d9386233ccf1db732913776793ad12e51ee9cdb3d17c349a56853599830b61bff2c6912792eb210200f2b4010229047569563ad1f37475fa7b8af4cb9
-
Filesize
78KB
MD5a1ff52737e3cc7070fe4b1b073d1a5cf
SHA16eca647872c133822b4db2c1fb7b64f2ddfd7f36
SHA256815c68c710c16c0bd3ed17cdc8a31601260051997e2c30f91b4c45cc7d896a3d
SHA5120f0c86efaacd3ddd54300cdae16c090339f742104681750d08683727ba1f641a24257edf2184a362a4ccbd30b89c1a7085e2a2ae7ffbac545ef756367cfb3a23
-
Filesize
660B
MD513b18c2e83729a30356a97ee58a7a108
SHA166f81a5284acf71c651224992137ad4b592165a8
SHA256c3e3df1e7b2e0d750c3aa06dbb814bb82371852b414a4cacbe7e929f294ec7de
SHA51238e1095b3ccdf427a58147cef3cee9eef3a3647b94b8916a07d73d571cd130ea814b0313a0ec47ab0e447074eaa689ccea843f209df1791965fcf6aaa027acc7
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c