Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
105066d63f68...41.exe
windows7-x64
105066d63f68...41.exe
windows10-2004-x64
10508fd9ddd0...0e.exe
windows7-x64
10508fd9ddd0...0e.exe
windows10-2004-x64
1050a0e27c44...1b.exe
windows7-x64
1050a0e27c44...1b.exe
windows10-2004-x64
1050ca83ea97...a1.exe
windows7-x64
750ca83ea97...a1.exe
windows10-2004-x64
75131f70fe8...c9.exe
windows7-x64
105131f70fe8...c9.exe
windows10-2004-x64
1051a043361b...63.exe
windows7-x64
1051a043361b...63.exe
windows10-2004-x64
751ae5a5c12...16.exe
windows7-x64
751ae5a5c12...16.exe
windows10-2004-x64
1051bce03659...62.exe
windows7-x64
1051bce03659...62.exe
windows10-2004-x64
10521cf0805a...97.exe
windows7-x64
10521cf0805a...97.exe
windows10-2004-x64
75250379192...f1.exe
windows7-x64
105250379192...f1.exe
windows10-2004-x64
105271d48de9...2e.exe
windows7-x64
75271d48de9...2e.exe
windows10-2004-x64
752af658910...b8.exe
windows7-x64
152af658910...b8.exe
windows10-2004-x64
152ef63d721...1f.exe
windows7-x64
1052ef63d721...1f.exe
windows10-2004-x64
1053008e68ab...9e.exe
windows7-x64
1053008e68ab...9e.exe
windows10-2004-x64
10535aeca70c...a0.exe
windows7-x64
6535aeca70c...a0.exe
windows10-2004-x64
65370f14c68...3e.exe
windows7-x64
105370f14c68...3e.exe
windows10-2004-x64
4Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:10
Behavioral task
behavioral1
Sample
5066d63f683553725c60860d021a0d41.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5066d63f683553725c60860d021a0d41.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
508fd9ddd025101fca7bd23c589d0a6d1e68a3f15e669df43bc930c30d35980e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
508fd9ddd025101fca7bd23c589d0a6d1e68a3f15e669df43bc930c30d35980e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
50a0e27c44685967486053465ad72a11a9a431ddf9c9e8a5c6f47c87a76d101b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
50a0e27c44685967486053465ad72a11a9a431ddf9c9e8a5c6f47c87a76d101b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
50ca83ea97b149fc0cddcfe79e9ecb2a0d230da4d26f0549f5792060be18aaa1.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
50ca83ea97b149fc0cddcfe79e9ecb2a0d230da4d26f0549f5792060be18aaa1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
5131f70fe8e529308014ee35b2ff10c9.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
5131f70fe8e529308014ee35b2ff10c9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
51a043361bd59e21a64fdb95fb472f63.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
51a043361bd59e21a64fdb95fb472f63.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
51ae5a5c1253ce8fbc9483a1e412a144a27ec6d1dc0b6c8832a36475b8912616.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
51ae5a5c1253ce8fbc9483a1e412a144a27ec6d1dc0b6c8832a36475b8912616.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
51bce03659ae9fd8336540fcecb2bb401b5967b00829fe23554c29dc96ff9462.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
51bce03659ae9fd8336540fcecb2bb401b5967b00829fe23554c29dc96ff9462.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
521cf0805a2515e0ccfc307f4b045897.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
521cf0805a2515e0ccfc307f4b045897.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
5250379192c5ba7c3145ad8bdf7939f44ab827de4db56a950a964fee01ea72f1.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
5250379192c5ba7c3145ad8bdf7939f44ab827de4db56a950a964fee01ea72f1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
5271d48de9aafb06b6371ef7035e993215063cc57fa7253ff06ef6a277da772e.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
5271d48de9aafb06b6371ef7035e993215063cc57fa7253ff06ef6a277da772e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
52af6589107938cd3e3225f3a91e05b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
52af6589107938cd3e3225f3a91e05b8.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
52ef63d7213d2cdef68a755faf5b44bd93e1eb92fb0701b37704d243c6d4861f.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
52ef63d7213d2cdef68a755faf5b44bd93e1eb92fb0701b37704d243c6d4861f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
53008e68ab00657702ebd582ff8dd1164b9809330083711a0409ed9dbdc50a9e.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
53008e68ab00657702ebd582ff8dd1164b9809330083711a0409ed9dbdc50a9e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
535aeca70c4f3e3aedbcef76f5870ddd86af9459a907dd3012e3f4e9c8c6dba0.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
535aeca70c4f3e3aedbcef76f5870ddd86af9459a907dd3012e3f4e9c8c6dba0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe
Resource
win10v2004-20250314-en
General
-
Target
51a043361bd59e21a64fdb95fb472f63.exe
-
Size
78KB
-
MD5
51a043361bd59e21a64fdb95fb472f63
-
SHA1
e605acc42664303e4776e95977af26cfcab3e02a
-
SHA256
751f6b8d77920eec4226c83b41e972117864bd8749369f33da5591bee60a3814
-
SHA512
fb8726f88ec0ed281eb6f38d70360208b5fefbcb66479541d17455d96446816c6522900e26057c79d9bb5587d53b6c4c1dbce0b7faa9623de21e9d9fba429ecc
-
SSDEEP
1536:He5sdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN6W9/t1l0:He5bn7N041Qqhg19/K
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 3044 tmpEDD8.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 51a043361bd59e21a64fdb95fb472f63.exe 2932 51a043361bd59e21a64fdb95fb472f63.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpEDD8.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51a043361bd59e21a64fdb95fb472f63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpEDD8.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 51a043361bd59e21a64fdb95fb472f63.exe Token: SeDebugPrivilege 3044 tmpEDD8.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2148 2932 51a043361bd59e21a64fdb95fb472f63.exe 31 PID 2932 wrote to memory of 2148 2932 51a043361bd59e21a64fdb95fb472f63.exe 31 PID 2932 wrote to memory of 2148 2932 51a043361bd59e21a64fdb95fb472f63.exe 31 PID 2932 wrote to memory of 2148 2932 51a043361bd59e21a64fdb95fb472f63.exe 31 PID 2148 wrote to memory of 2164 2148 vbc.exe 33 PID 2148 wrote to memory of 2164 2148 vbc.exe 33 PID 2148 wrote to memory of 2164 2148 vbc.exe 33 PID 2148 wrote to memory of 2164 2148 vbc.exe 33 PID 2932 wrote to memory of 3044 2932 51a043361bd59e21a64fdb95fb472f63.exe 34 PID 2932 wrote to memory of 3044 2932 51a043361bd59e21a64fdb95fb472f63.exe 34 PID 2932 wrote to memory of 3044 2932 51a043361bd59e21a64fdb95fb472f63.exe 34 PID 2932 wrote to memory of 3044 2932 51a043361bd59e21a64fdb95fb472f63.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a043361bd59e21a64fdb95fb472f63.exe"C:\Users\Admin\AppData\Local\Temp\51a043361bd59e21a64fdb95fb472f63.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jzahpnk0.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEF30.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEF2F.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpEDD8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpEDD8.tmp.exe" C:\Users\Admin\AppData\Local\Temp\51a043361bd59e21a64fdb95fb472f63.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a34f1548f46f86770ad6c01ed742256a
SHA1a496720f6e534da2b234f941e6b4990b9ead1506
SHA256ccacbb050b85d0fde9c1c9a59a3866868181d89e0afc8669eaba12e8c8b69305
SHA512ee82fe1965a49b0e73b162be05d061687c95dbdaf33f09fe35f888b7e74ce0c53c6bb357efb34d29dd784d90f66f6b8bdf8f9b14413105712f9447083e8038b7
-
Filesize
14KB
MD5a76c82edd442d2c468e27f13f49ed103
SHA12713a7d7aa9f85e18a3ed26e01fdbad76bfa797a
SHA25697bd42ed066584633359c7a3cf219086e591b00ab829245c700565ccb1b9b824
SHA512370bf24e125480c16746aeabb93f06c84d67c23c1502da9f84234d35294d6ddb736775d8784730356f42c6f53983b4ee21ad3462f2d1074a267b814301bc576b
-
Filesize
266B
MD58fbfdd646ab8ea568eb104a907c902d6
SHA191b6790eb66a77f9f3005fab6d9595c5f35249b4
SHA256e77a283d7caecf1e0f938292ffaf709c2174dff55ad2d609ab80d006875a2738
SHA5124d86655c3a681723167cf7017faa2cf07dd56871b45eb341890f8524c817e77f5fab9b322f88446040dd3e3f3b7858718c5839ff5d8bb3a68be24ed2ddeaf965
-
Filesize
78KB
MD5da910c49ff82b37961fd6631067d2888
SHA179042c28b6f8635ea1e7dbc2c72217cc4a9c8846
SHA256802fb0c76e2b910b0466564c89fd5c6b5fe50a9f84d12fbbef10badec9e834ca
SHA512bb65cf33e0ebd97f91e537b71a9acc9448dffe94c454ac822fedf62aa51f0379bbb9a76295a3ae9575b871202ba871897fc403700d5cc9372f2ff4012ab339bc
-
Filesize
660B
MD55e6b614525600a7cb64378d794f0d1fc
SHA15f90a463aedca9541cbdb39834311985abf57403
SHA25699987bc38766bbc741f532d026d87cbb33a5cd344fa63c06770cc932c1b320e9
SHA5129b00deb114bc1690f7624b4e7f9fe3cb50c3ef4f101157de152a7dc89ad1f0a644f12ab88ec5c33bf04d11d2b9869de885b57b319f3b33afc8aa53c729b1a4ed
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65