Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2025, 18:58

General

  • Target

    7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe

  • Size

    78KB

  • MD5

    a0644ba03ff17739ab64dac9d2af1130

  • SHA1

    cc70c7053352b22f6f85460a96cf2cee20bf29f9

  • SHA256

    7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8

  • SHA512

    130b816cfc1bc6a32db07fcab17186fae9fbb8d4aecaf26179365b2e720264a526f6f7a64b1956dcfd3934fff7423b32735a53668e9c9788b61c4a7ebe1f253a

  • SSDEEP

    1536:lRCHY6M7t/vZv0kH9gDDtWzYCnJPeoYrGQteA9/y1ADc:lRCHYnh/l0Y9MDYrm7eA9/pc

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
    "C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\so9_otuo.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA94B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA94A.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1916
    • C:\Users\Admin\AppData\Local\Temp\tmpA89E.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA89E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7ad55881d74d6c315d1dbe42c274e0cda07a7cda8dbb1e1f974f601cc3a7a0d8N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESA94B.tmp

    Filesize

    1KB

    MD5

    990640085d9f380a828bcad44a5fbf4c

    SHA1

    79434ee62dbfda9fceccde05be3466bf5b537bfc

    SHA256

    f98380008b2023122d230d9dc52ec8170105ed5bf4624d603b1843a4000188f4

    SHA512

    2c2787fa07f9d6d34a65b4f0d05ef5a38b741df422bc348b61f0a27a41cf5231005fab9481addfb9815063356672da998f2431c33f000087e78897d75519f2b6

  • C:\Users\Admin\AppData\Local\Temp\so9_otuo.0.vb

    Filesize

    15KB

    MD5

    fefa5dc04a2d1c85c5f944b7f1f4eb35

    SHA1

    400e8816b58b593d445e9da8e275640d1ddc0aec

    SHA256

    781c57126d3dd2b3a6c2a98912fadb62e21aca432e193563c93e6b5c897eebd0

    SHA512

    8c0c173735a546053a4712e7f2de14271dc44c39f8962552d24bf83f253691ff19f9eb4011f084cc8ab0b425ea80b3a2efd963a2d91714bca1a3e3f6af6aff62

  • C:\Users\Admin\AppData\Local\Temp\so9_otuo.cmdline

    Filesize

    266B

    MD5

    785415a55ac8383dc04bb343ee2e57ba

    SHA1

    c6287530d84b72386c363f5bf4cb37564710e615

    SHA256

    b5da80cab142082af2c093db63543f023a08e35506786a6640670a6be937059d

    SHA512

    2d11386cb5b039173021fd296e8ab85987e8386c51efc4ed69805bdfab61e224693d678fe6453bca4d021a8a898e7c7829d8d1517ae312912c9208b14a080a2e

  • C:\Users\Admin\AppData\Local\Temp\tmpA89E.tmp.exe

    Filesize

    78KB

    MD5

    199e89a46462f914d91ceed4bcdda973

    SHA1

    5b195c1b3f7db7a6e5dc96a83c61609a6308ce84

    SHA256

    b81665d716af1d00ca7a613f4c5f1dd9b7fdd06c367b1a523379bd1296e4d817

    SHA512

    29e91c79a05a058d99c058e3377d7260bae612e9449b34ce413d5c6fb04c25827a64cce0bb97fa4f965c7ae02e94fe24e3cc0583175b3df2d4da591ea55cff6c

  • C:\Users\Admin\AppData\Local\Temp\vbcA94A.tmp

    Filesize

    660B

    MD5

    db3f77dff711315b75a3ac2618d120a3

    SHA1

    54bf71e627120f6f54bf67e1f70f4881170a16f9

    SHA256

    5ecd4b235b40510ed15699d72472cbb5e152cdc77264b83f98b6d1e11534af9c

    SHA512

    426dec9514fb6360476892305a6eca60392799a2e2f15f0dc259bf1be84e692a5230a8edacbf16e4b5e960a181e4e9a771a5ef8676a1a178c71fd851bb8229e6

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/2072-8-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2072-18-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-0-0x0000000074251000-0x0000000074252000-memory.dmp

    Filesize

    4KB

  • memory/2520-1-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-2-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-24-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB