Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:08

General

  • Target

    12106013cf4b5ee1826ab514eb4f7270.exe

  • Size

    78KB

  • MD5

    12106013cf4b5ee1826ab514eb4f7270

  • SHA1

    2a83fdefe957118925152b578b42fef9382b0bfc

  • SHA256

    a0110b1ca62fd74b4ab17d381a0c8a7872e360dd6e0ff1ba4c570c0f6870006f

  • SHA512

    8f37acb6784224f7411518261b4663a33678fff116ec0de55cb740123cca91a9c1ce9c3cb19209babd52345bd882b9263b1b3b81186f4ef0f32c2b4b85134c58

  • SSDEEP

    1536:nHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtRe9/f1xA:nHFo53Ln7N041QqhgRe9/0

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12106013cf4b5ee1826ab514eb4f7270.exe
    "C:\Users\Admin\AppData\Local\Temp\12106013cf4b5ee1826ab514eb4f7270.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5328
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yl1b5y50.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9451.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAF0968633A7A437395DF8AC68D5A1A5C.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4784
    • C:\Users\Admin\AppData\Local\Temp\tmp92CA.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp92CA.tmp.exe" C:\Users\Admin\AppData\Local\Temp\12106013cf4b5ee1826ab514eb4f7270.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9451.tmp

    Filesize

    1KB

    MD5

    8ce1fcdfd04470e879658d3cc7631cc6

    SHA1

    cb254180d89f73546c80fb1965cbd4791c9a8330

    SHA256

    c04491afe7d93c82996207b4ad43d60620951dc43854e07f4ee56c02e4823f09

    SHA512

    1c1c37c4527b6d3834506afd414c08c9a5ab18eff9f8c16b749de8d160df317a4cc7f54747c5083d64fd53bbe583357bfceffe58a63d515e085d176a081a7938

  • C:\Users\Admin\AppData\Local\Temp\tmp92CA.tmp.exe

    Filesize

    78KB

    MD5

    c59f506f2adc9c8baaf31f0944ab9b1d

    SHA1

    de1a83e10cd5facf824299ccdcbfecda5ba2ea04

    SHA256

    29e431ac856464d9540073804656f3ef0ecfa0a65257a7ef873529fd30d4a577

    SHA512

    91c39c8eba8fcf4d6c9462f21bc005d3910c07cfc3a5faad51c8ee2ee50f56d2bfc4bd4faf0246d8e854a86bd4191acc01487305d164736a2a41192044829448

  • C:\Users\Admin\AppData\Local\Temp\vbcAF0968633A7A437395DF8AC68D5A1A5C.TMP

    Filesize

    660B

    MD5

    96240c2ddc0af06b481493d26efde518

    SHA1

    b0565cc7b306f8420f825f8cb6ce562899748a5e

    SHA256

    1da53b5357e9333839f2949bff153c9f0e7214bfb872c8a664e6df688f3dc7bf

    SHA512

    ea7acd945b086e817c5e67f5dabf7fa6df8283d0e50961a248f0a7eb495d4c45ff1b099e29c4802bc6a2620e27e92362fc4e87b2e591ae1cf2fc3262e4d145b3

  • C:\Users\Admin\AppData\Local\Temp\yl1b5y50.0.vb

    Filesize

    15KB

    MD5

    f61eb011e2811ebbf05f97f33d92d786

    SHA1

    de096db66552009458a71e38104de8da32ea1c25

    SHA256

    c1e8f83c71d602d2fd816955406ba9ccef159e5249b0f44452acc367ebc1ecbe

    SHA512

    1b20a10a0859f41e80018084f56c0d6fcf63896679aa9760d0bf0d0d1ac31d112aeefcd7596c6ed062c7b2d4bebe435311944322003895eb8b9f09329513a343

  • C:\Users\Admin\AppData\Local\Temp\yl1b5y50.cmdline

    Filesize

    266B

    MD5

    b70b877fb37f4bb24592999dde1a251f

    SHA1

    2a114420cbdbae85acdac5a0c1d8ad731a366a6f

    SHA256

    bd52d56236dfcfd83e95d7044557241e95dcdc8c185ab6b8aa475959b609ff35

    SHA512

    c3f8ade08cca3d6f4571398812b8ff2833937b64dd0ce36a3785a14abceb19e17a84b0b08c47e56ac2e36fb51fdf8f0219fd4752149ec93f69612d9960ec5763

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/4688-8-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4688-18-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4920-23-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4920-24-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4920-25-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4920-27-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4920-28-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4920-29-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/5328-0-0x00000000754D2000-0x00000000754D3000-memory.dmp

    Filesize

    4KB

  • memory/5328-2-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/5328-1-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB

  • memory/5328-22-0x00000000754D0000-0x0000000075A81000-memory.dmp

    Filesize

    5.7MB