Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2025, 06:52

General

  • Target

    15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe

  • Size

    78KB

  • MD5

    71f4db3c74f290a49e0008139fe2d4f2

  • SHA1

    d137a3640e393da795b36219c630c25250ebb2de

  • SHA256

    15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d

  • SHA512

    9265edbd371ecc74a2c496e38bcb1759e5321fdfc6bbdc964b65d9fae03e4997951a370e191ecc9cbd6a43159c9d4251d52c410a68a53b054537ead953729d61

  • SSDEEP

    1536:auHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQte89/5V1LEw:auHY53Ln7N041Qqhge89/5Iw

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe
    "C:\Users\Admin\AppData\Local\Temp\15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xzuoll_9.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCC45.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCC35.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2560
    • C:\Users\Admin\AppData\Local\Temp\tmpCAED.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpCAED.tmp.exe" C:\Users\Admin\AppData\Local\Temp\15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESCC45.tmp

    Filesize

    1KB

    MD5

    5fdaade35c24c1832aa2da7114ddfe8c

    SHA1

    b6732bb9fc7004cb519dd93255fd55cbf4b3b4c4

    SHA256

    2db839561e7dc39b5edee3cb7d2d6236515e13cc9f515e014460720d00beb82c

    SHA512

    2a126445413a7ccd0ae7d1f5182fff68ff6490c043bd3edf62f4b5e69a6d8b834b5da8b5454fe9e969fc65e5cecb0228e0aa154776ab2d48d6bb0b21835c6e4b

  • C:\Users\Admin\AppData\Local\Temp\tmpCAED.tmp.exe

    Filesize

    78KB

    MD5

    7b3e6d58fa8f4e4ace99137c7f32f7c1

    SHA1

    f4d94ea9aeded4684115830f593625b7f1a95924

    SHA256

    cc36d0cacb88a5b849a3fffb57370ea28a3e3f0844e58740263efd566595c460

    SHA512

    b5bb07c5c082b517f7d3c6582f0d958156ea8861714f9ea363e6aff13459411479eed36fb7fc184744b68099de1db622c40bf1b3b22bab024f5b4323188bf482

  • C:\Users\Admin\AppData\Local\Temp\vbcCC35.tmp

    Filesize

    660B

    MD5

    60252a9c279ecc718f2a081a1dc78c58

    SHA1

    a64a685e2e4b2d988134d509003d362201befdc6

    SHA256

    88630df246a8be5506f16a52f9e6050167518bf89b46dba573bd9b7a8cba9048

    SHA512

    d50a2db02aae72223473d74ae9ba18136887b7992dd100b456845603fa093288944255d4f852206b3eb89c297e032cecdca5986350a5db9e56aaf205e2925b33

  • C:\Users\Admin\AppData\Local\Temp\xzuoll_9.0.vb

    Filesize

    15KB

    MD5

    208e1b8e5e6283522a9c752fb9a24b5b

    SHA1

    22a9ea84fbda902845c7d5bc8e86e09a405ba713

    SHA256

    958ffe0b01bc38c417b6915527d064338599118ecd5d652300a37c0969a60617

    SHA512

    8ae8995c8c62b0f7758d04ab16d96e2aa7498d18835a611db8084547771bfd2383d87d632bb76be356587709eaba8d01212e58c3c9a3fb904fdcf28aa8c380eb

  • C:\Users\Admin\AppData\Local\Temp\xzuoll_9.cmdline

    Filesize

    266B

    MD5

    ba76de6973a2585f3fd73bc765720bb8

    SHA1

    e4fe190a4573766143d7f9f78769ec76c9ea2728

    SHA256

    53b208b674a4fc97b9e005e632a7be7860a30a554c0ed05ced74aa311dccaf5b

    SHA512

    c3fcc4a0165facb6c1e4e2973e5d99a253ea77156da7d7aafbf8ff881d83a708baa48bfa0186c6585042b79fc97fe78025141519d18bc65b99ba25103cd57264

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2172-0-0x0000000074081000-0x0000000074082000-memory.dmp

    Filesize

    4KB

  • memory/2172-1-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB

  • memory/2172-2-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB

  • memory/2172-24-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB

  • memory/2404-8-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB

  • memory/2404-18-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB