Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/01/2025, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
Resource
win10v2004-20241007-en
General
-
Target
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
-
Size
78KB
-
MD5
a0644ba03ff17739ab64dac9d2af1130
-
SHA1
cc70c7053352b22f6f85460a96cf2cee20bf29f9
-
SHA256
7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8
-
SHA512
130b816cfc1bc6a32db07fcab17186fae9fbb8d4aecaf26179365b2e720264a526f6f7a64b1956dcfd3934fff7423b32735a53668e9c9788b61c4a7ebe1f253a
-
SSDEEP
1536:lRCHY6M7t/vZv0kH9gDDtWzYCnJPeoYrGQteA9/y1ADc:lRCHYnh/l0Y9MDYrm7eA9/pc
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2888 tmpA89E.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmpA89E.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA89E.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe Token: SeDebugPrivilege 2888 tmpA89E.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2072 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 30 PID 2520 wrote to memory of 2072 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 30 PID 2520 wrote to memory of 2072 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 30 PID 2520 wrote to memory of 2072 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 30 PID 2072 wrote to memory of 1916 2072 vbc.exe 32 PID 2072 wrote to memory of 1916 2072 vbc.exe 32 PID 2072 wrote to memory of 1916 2072 vbc.exe 32 PID 2072 wrote to memory of 1916 2072 vbc.exe 32 PID 2520 wrote to memory of 2888 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 33 PID 2520 wrote to memory of 2888 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 33 PID 2520 wrote to memory of 2888 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 33 PID 2520 wrote to memory of 2888 2520 7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe"C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\so9_otuo.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA94B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA94A.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA89E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA89E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5990640085d9f380a828bcad44a5fbf4c
SHA179434ee62dbfda9fceccde05be3466bf5b537bfc
SHA256f98380008b2023122d230d9dc52ec8170105ed5bf4624d603b1843a4000188f4
SHA5122c2787fa07f9d6d34a65b4f0d05ef5a38b741df422bc348b61f0a27a41cf5231005fab9481addfb9815063356672da998f2431c33f000087e78897d75519f2b6
-
Filesize
15KB
MD5fefa5dc04a2d1c85c5f944b7f1f4eb35
SHA1400e8816b58b593d445e9da8e275640d1ddc0aec
SHA256781c57126d3dd2b3a6c2a98912fadb62e21aca432e193563c93e6b5c897eebd0
SHA5128c0c173735a546053a4712e7f2de14271dc44c39f8962552d24bf83f253691ff19f9eb4011f084cc8ab0b425ea80b3a2efd963a2d91714bca1a3e3f6af6aff62
-
Filesize
266B
MD5785415a55ac8383dc04bb343ee2e57ba
SHA1c6287530d84b72386c363f5bf4cb37564710e615
SHA256b5da80cab142082af2c093db63543f023a08e35506786a6640670a6be937059d
SHA5122d11386cb5b039173021fd296e8ab85987e8386c51efc4ed69805bdfab61e224693d678fe6453bca4d021a8a898e7c7829d8d1517ae312912c9208b14a080a2e
-
Filesize
78KB
MD5199e89a46462f914d91ceed4bcdda973
SHA15b195c1b3f7db7a6e5dc96a83c61609a6308ce84
SHA256b81665d716af1d00ca7a613f4c5f1dd9b7fdd06c367b1a523379bd1296e4d817
SHA51229e91c79a05a058d99c058e3377d7260bae612e9449b34ce413d5c6fb04c25827a64cce0bb97fa4f965c7ae02e94fe24e3cc0583175b3df2d4da591ea55cff6c
-
Filesize
660B
MD5db3f77dff711315b75a3ac2618d120a3
SHA154bf71e627120f6f54bf67e1f70f4881170a16f9
SHA2565ecd4b235b40510ed15699d72472cbb5e152cdc77264b83f98b6d1e11534af9c
SHA512426dec9514fb6360476892305a6eca60392799a2e2f15f0dc259bf1be84e692a5230a8edacbf16e4b5e960a181e4e9a771a5ef8676a1a178c71fd851bb8229e6
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d