Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    51a043361bd59e21a64fdb95fb472f63.exe

  • Size

    78KB

  • MD5

    51a043361bd59e21a64fdb95fb472f63

  • SHA1

    e605acc42664303e4776e95977af26cfcab3e02a

  • SHA256

    751f6b8d77920eec4226c83b41e972117864bd8749369f33da5591bee60a3814

  • SHA512

    fb8726f88ec0ed281eb6f38d70360208b5fefbcb66479541d17455d96446816c6522900e26057c79d9bb5587d53b6c4c1dbce0b7faa9623de21e9d9fba429ecc

  • SSDEEP

    1536:He5sdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN6W9/t1l0:He5bn7N041Qqhg19/K

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51a043361bd59e21a64fdb95fb472f63.exe
    "C:\Users\Admin\AppData\Local\Temp\51a043361bd59e21a64fdb95fb472f63.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jzahpnk0.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEF30.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEF2F.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2164
    • C:\Users\Admin\AppData\Local\Temp\tmpEDD8.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpEDD8.tmp.exe" C:\Users\Admin\AppData\Local\Temp\51a043361bd59e21a64fdb95fb472f63.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESEF30.tmp

    Filesize

    1KB

    MD5

    a34f1548f46f86770ad6c01ed742256a

    SHA1

    a496720f6e534da2b234f941e6b4990b9ead1506

    SHA256

    ccacbb050b85d0fde9c1c9a59a3866868181d89e0afc8669eaba12e8c8b69305

    SHA512

    ee82fe1965a49b0e73b162be05d061687c95dbdaf33f09fe35f888b7e74ce0c53c6bb357efb34d29dd784d90f66f6b8bdf8f9b14413105712f9447083e8038b7

  • C:\Users\Admin\AppData\Local\Temp\jzahpnk0.0.vb

    Filesize

    14KB

    MD5

    a76c82edd442d2c468e27f13f49ed103

    SHA1

    2713a7d7aa9f85e18a3ed26e01fdbad76bfa797a

    SHA256

    97bd42ed066584633359c7a3cf219086e591b00ab829245c700565ccb1b9b824

    SHA512

    370bf24e125480c16746aeabb93f06c84d67c23c1502da9f84234d35294d6ddb736775d8784730356f42c6f53983b4ee21ad3462f2d1074a267b814301bc576b

  • C:\Users\Admin\AppData\Local\Temp\jzahpnk0.cmdline

    Filesize

    266B

    MD5

    8fbfdd646ab8ea568eb104a907c902d6

    SHA1

    91b6790eb66a77f9f3005fab6d9595c5f35249b4

    SHA256

    e77a283d7caecf1e0f938292ffaf709c2174dff55ad2d609ab80d006875a2738

    SHA512

    4d86655c3a681723167cf7017faa2cf07dd56871b45eb341890f8524c817e77f5fab9b322f88446040dd3e3f3b7858718c5839ff5d8bb3a68be24ed2ddeaf965

  • C:\Users\Admin\AppData\Local\Temp\tmpEDD8.tmp.exe

    Filesize

    78KB

    MD5

    da910c49ff82b37961fd6631067d2888

    SHA1

    79042c28b6f8635ea1e7dbc2c72217cc4a9c8846

    SHA256

    802fb0c76e2b910b0466564c89fd5c6b5fe50a9f84d12fbbef10badec9e834ca

    SHA512

    bb65cf33e0ebd97f91e537b71a9acc9448dffe94c454ac822fedf62aa51f0379bbb9a76295a3ae9575b871202ba871897fc403700d5cc9372f2ff4012ab339bc

  • C:\Users\Admin\AppData\Local\Temp\vbcEF2F.tmp

    Filesize

    660B

    MD5

    5e6b614525600a7cb64378d794f0d1fc

    SHA1

    5f90a463aedca9541cbdb39834311985abf57403

    SHA256

    99987bc38766bbc741f532d026d87cbb33a5cd344fa63c06770cc932c1b320e9

    SHA512

    9b00deb114bc1690f7624b4e7f9fe3cb50c3ef4f101157de152a7dc89ad1f0a644f12ab88ec5c33bf04d11d2b9869de885b57b319f3b33afc8aa53c729b1a4ed

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2148-8-0x00000000749D0000-0x0000000074F7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2148-18-0x00000000749D0000-0x0000000074F7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-0-0x00000000749D1000-0x00000000749D2000-memory.dmp

    Filesize

    4KB

  • memory/2932-1-0x00000000749D0000-0x0000000074F7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-2-0x00000000749D0000-0x0000000074F7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-24-0x00000000749D0000-0x0000000074F7B000-memory.dmp

    Filesize

    5.7MB