Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe
Resource
win10v2004-20241007-en
General
-
Target
15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe
-
Size
78KB
-
MD5
71f4db3c74f290a49e0008139fe2d4f2
-
SHA1
d137a3640e393da795b36219c630c25250ebb2de
-
SHA256
15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d
-
SHA512
9265edbd371ecc74a2c496e38bcb1759e5321fdfc6bbdc964b65d9fae03e4997951a370e191ecc9cbd6a43159c9d4251d52c410a68a53b054537ead953729d61
-
SSDEEP
1536:auHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQte89/5V1LEw:auHY53Ln7N041Qqhge89/5Iw
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2508 tmpCAED.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpCAED.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpCAED.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe Token: SeDebugPrivilege 2508 tmpCAED.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2404 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 30 PID 2172 wrote to memory of 2404 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 30 PID 2172 wrote to memory of 2404 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 30 PID 2172 wrote to memory of 2404 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 30 PID 2404 wrote to memory of 2560 2404 vbc.exe 32 PID 2404 wrote to memory of 2560 2404 vbc.exe 32 PID 2404 wrote to memory of 2560 2404 vbc.exe 32 PID 2404 wrote to memory of 2560 2404 vbc.exe 32 PID 2172 wrote to memory of 2508 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 33 PID 2172 wrote to memory of 2508 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 33 PID 2172 wrote to memory of 2508 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 33 PID 2172 wrote to memory of 2508 2172 15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe"C:\Users\Admin\AppData\Local\Temp\15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xzuoll_9.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCC45.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCC35.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpCAED.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpCAED.tmp.exe" C:\Users\Admin\AppData\Local\Temp\15ea40cfb8aeedce17c4b3b29e1088ff39d0cad78e7cc54714748b18dc931c2d.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55fdaade35c24c1832aa2da7114ddfe8c
SHA1b6732bb9fc7004cb519dd93255fd55cbf4b3b4c4
SHA2562db839561e7dc39b5edee3cb7d2d6236515e13cc9f515e014460720d00beb82c
SHA5122a126445413a7ccd0ae7d1f5182fff68ff6490c043bd3edf62f4b5e69a6d8b834b5da8b5454fe9e969fc65e5cecb0228e0aa154776ab2d48d6bb0b21835c6e4b
-
Filesize
78KB
MD57b3e6d58fa8f4e4ace99137c7f32f7c1
SHA1f4d94ea9aeded4684115830f593625b7f1a95924
SHA256cc36d0cacb88a5b849a3fffb57370ea28a3e3f0844e58740263efd566595c460
SHA512b5bb07c5c082b517f7d3c6582f0d958156ea8861714f9ea363e6aff13459411479eed36fb7fc184744b68099de1db622c40bf1b3b22bab024f5b4323188bf482
-
Filesize
660B
MD560252a9c279ecc718f2a081a1dc78c58
SHA1a64a685e2e4b2d988134d509003d362201befdc6
SHA25688630df246a8be5506f16a52f9e6050167518bf89b46dba573bd9b7a8cba9048
SHA512d50a2db02aae72223473d74ae9ba18136887b7992dd100b456845603fa093288944255d4f852206b3eb89c297e032cecdca5986350a5db9e56aaf205e2925b33
-
Filesize
15KB
MD5208e1b8e5e6283522a9c752fb9a24b5b
SHA122a9ea84fbda902845c7d5bc8e86e09a405ba713
SHA256958ffe0b01bc38c417b6915527d064338599118ecd5d652300a37c0969a60617
SHA5128ae8995c8c62b0f7758d04ab16d96e2aa7498d18835a611db8084547771bfd2383d87d632bb76be356587709eaba8d01212e58c3c9a3fb904fdcf28aa8c380eb
-
Filesize
266B
MD5ba76de6973a2585f3fd73bc765720bb8
SHA1e4fe190a4573766143d7f9f78769ec76c9ea2728
SHA25653b208b674a4fc97b9e005e632a7be7860a30a554c0ed05ced74aa311dccaf5b
SHA512c3fcc4a0165facb6c1e4e2973e5d99a253ea77156da7d7aafbf8ff881d83a708baa48bfa0186c6585042b79fc97fe78025141519d18bc65b99ba25103cd57264
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65