Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1011a186984a...8e.exe
windows7-x64
1011a186984a...8e.exe
windows10-2004-x64
1012085ebb04...95.exe
windows7-x64
712085ebb04...95.exe
windows10-2004-x64
712106013cf...70.exe
windows7-x64
712106013cf...70.exe
windows10-2004-x64
1012199d72af...85.exe
windows7-x64
712199d72af...85.exe
windows10-2004-x64
71221040998...44.exe
windows7-x64
11221040998...44.exe
windows10-2004-x64
1124dba0b2d...f5.exe
windows7-x64
10124dba0b2d...f5.exe
windows10-2004-x64
101277e3138b...40.exe
windows7-x64
71277e3138b...40.exe
windows10-2004-x64
7128d992668...24.exe
windows7-x64
128d992668...24.exe
windows10-2004-x64
12ad57fc11...51.exe
windows7-x64
1012ad57fc11...51.exe
windows10-2004-x64
1012c28767fd...83.exe
windows7-x64
712c28767fd...83.exe
windows10-2004-x64
712c96664a8...ef.exe
windows7-x64
112c96664a8...ef.exe
windows10-2004-x64
812d3790d20...e3.exe
windows7-x64
1012d3790d20...e3.exe
windows10-2004-x64
1012e02e413d...cd.exe
windows7-x64
1012e02e413d...cd.exe
windows10-2004-x64
101300fbf843...ba.exe
windows7-x64
11300fbf843...ba.exe
windows10-2004-x64
11302b023e7...d0.exe
windows7-x64
101302b023e7...d0.exe
windows10-2004-x64
10132d07a999...ba.exe
windows7-x64
10132d07a999...ba.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:08
Behavioral task
behavioral1
Sample
11a186984a7cc6c1fd4317dffed3a78e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11a186984a7cc6c1fd4317dffed3a78e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
12085ebb04414916835a2dbcd2cdfa95.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
12085ebb04414916835a2dbcd2cdfa95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
12106013cf4b5ee1826ab514eb4f7270.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
12106013cf4b5ee1826ab514eb4f7270.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
12199d72af0652fdf09349f59304d485.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
12199d72af0652fdf09349f59304d485.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
1221040998425fdd5a21132a64664d44.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
1221040998425fdd5a21132a64664d44.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
124dba0b2dc9c0fbfca662c90c117b8d64b655ae41744a3ac84f9e4772e722f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
124dba0b2dc9c0fbfca662c90c117b8d64b655ae41744a3ac84f9e4772e722f5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
1277e3138bd062ad1b4496b667377740.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
1277e3138bd062ad1b4496b667377740.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
128d99266894940572aa679491991ffa32c69a3f30b328a316ff2106d88bbf24.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
128d99266894940572aa679491991ffa32c69a3f30b328a316ff2106d88bbf24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
12ad57fc1129bbd8f479ba77406cf3b88d6da57c734a97299bb080341edefc51.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
12ad57fc1129bbd8f479ba77406cf3b88d6da57c734a97299bb080341edefc51.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
12c28767fd63064bd07e6679f2c45083.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
12c28767fd63064bd07e6679f2c45083.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
12c96664a866ff277b9245ef96eb64bd45af3f29145600b828a14312ba332fef.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
12c96664a866ff277b9245ef96eb64bd45af3f29145600b828a14312ba332fef.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
12d3790d20dcd64ff72360ebd3b199e3.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
12d3790d20dcd64ff72360ebd3b199e3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
12e02e413d59c118fb50dcbf2f8ef3cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
12e02e413d59c118fb50dcbf2f8ef3cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
1300fbf843b8fcf8554979a45a3e48ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
1300fbf843b8fcf8554979a45a3e48ba.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
132d07a999d32afb20d86ba84981ceed907353b3d7b5b0aae98c59759c41e3ba.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
132d07a999d32afb20d86ba84981ceed907353b3d7b5b0aae98c59759c41e3ba.exe
Resource
win10v2004-20250314-en
General
-
Target
12e02e413d59c118fb50dcbf2f8ef3cd.exe
-
Size
78KB
-
MD5
12e02e413d59c118fb50dcbf2f8ef3cd
-
SHA1
8bacab7d1e97c72ea77a88505846f23c9ea5521a
-
SHA256
3550e8bf4400c2c8580dcb7776a133cee3ce9bce09022fdd27daf9f23fb25ea5
-
SHA512
0e58cd7c7af4f4f3930148958a19420f028f46de9975e40e1714db500ff0ef1f029018cc989eac7f2b1e1f3a068ea8c8686e316a30979b2a4ab721c314839154
-
SSDEEP
1536:oPWtHH638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtm9/ZE1vK:oPWtHa3Ln7N041Qqhgm9/Z/
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2956 tmpAF43.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpAF43.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAF43.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12e02e413d59c118fb50dcbf2f8ef3cd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe Token: SeDebugPrivilege 2956 tmpAF43.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2160 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 30 PID 2592 wrote to memory of 2160 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 30 PID 2592 wrote to memory of 2160 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 30 PID 2592 wrote to memory of 2160 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 30 PID 2160 wrote to memory of 2512 2160 vbc.exe 32 PID 2160 wrote to memory of 2512 2160 vbc.exe 32 PID 2160 wrote to memory of 2512 2160 vbc.exe 32 PID 2160 wrote to memory of 2512 2160 vbc.exe 32 PID 2592 wrote to memory of 2956 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 33 PID 2592 wrote to memory of 2956 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 33 PID 2592 wrote to memory of 2956 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 33 PID 2592 wrote to memory of 2956 2592 12e02e413d59c118fb50dcbf2f8ef3cd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\12e02e413d59c118fb50dcbf2f8ef3cd.exe"C:\Users\Admin\AppData\Local\Temp\12e02e413d59c118fb50dcbf2f8ef3cd.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1rwp8utw.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB01E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB00D.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpAF43.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAF43.tmp.exe" C:\Users\Admin\AppData\Local\Temp\12e02e413d59c118fb50dcbf2f8ef3cd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD58856812162cf1b2d1d8b1d38e6ff9992
SHA12c2aa6fc3ae4af44bee57b417c28c4957788cd28
SHA2568fa5447f2eb64daf350c38f8f805a863da7fa337dea0f901c59bc0680f34dbf7
SHA5122d5fae676e09a13ab58f5f76d0493f5161a4785ced22688717416eb6f19a54ea18527ac59f6cb6e5bb1f7bd1d2dec588ffa7dc54bee550ed33e2cb5c5aabd52d
-
Filesize
266B
MD55754cbb5735980a2aa5ac23eabb7db7c
SHA124750bb7a0b71c0d2c8f2e16872a536ea4888471
SHA25632e7d2f3eb3d808cd993d1d60ba0ef90c60b356bd5590d7946bd5ee13d26f489
SHA512d7caf1e59d61be6a0b7adb43992e76031d6fbc75d35807a47c9175a6e47c9eeaf43d25ec4439ac2f70fccb0c0977597935239b8413294fbfa48e19a305d55b8e
-
Filesize
1KB
MD566c2a4c34d8bcbb50aafb0fa61e023f3
SHA1c1369db617d01e24a6ac121d9cfb5e4c31773b74
SHA2569768495d11b9eb5accdfecbbcab9a6e0c5665f80875b273588292a2019467a9a
SHA5129b1b6a0da3727b31dc4e1cb2d88574e6a0f7a15489d81d68af43240415974914347c184b5202885d0ade4e5844103a1fcd985a9cd341e43a7dd835fe65750837
-
Filesize
78KB
MD5684305b2cad89df36b6cee563f6f1f0b
SHA103cc0e049bd32f0bc6e852789705c639950f8093
SHA256789802920a5174579742cb922ad9424730e4ef2d7ea52c0bfee70aa8a89197db
SHA512f0e2e7d742d066544bc052cd4ad7fcbcece330ac87b6de1f056939630c3bb88cfc99f0f8af9980604a5c998ae7ce3c452d33b9cb9b0f88be975a253ddf2a7fbb
-
Filesize
660B
MD51a86ab9e3b12382d446a47f6f8a53d27
SHA1e3a67eb03859961f936e231f332e61af5331350f
SHA256e6b7c8263eec6981e61034fc668e1e61c3635d741c2068884032413ec28971c3
SHA51213bbd38b292c45577a5f0f93d350b512cd6a4a6460edffa370335b6e984e83de608b3a8e7e9fc906256cc76f0edf4aa77471108769c99784c9281356b9f420ba
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65