Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:13

General

  • Target

    7ef695e2eb00583acd7c520cf107188f.exe

  • Size

    78KB

  • MD5

    7ef695e2eb00583acd7c520cf107188f

  • SHA1

    81b07c6a5b9ff127044492483e978d0aa3c709a7

  • SHA256

    198f7e8e6e6b9f8d60ef722311078e085ccd7f3034176c4cb39db6d43be50451

  • SHA512

    1a8329294fc2f46a7012ebd374a0b2e7731fd840b471654ecd7ab9aa7d1f56fdd99cca1a001373d70117ead83fe5c9c6bbfe7866a63d413a13bcdd8e39368a58

  • SSDEEP

    1536:XV586dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN6ox9/M1RT:XV581n7N041Qqhg9x9/E

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ef695e2eb00583acd7c520cf107188f.exe
    "C:\Users\Admin\AppData\Local\Temp\7ef695e2eb00583acd7c520cf107188f.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bul952hw.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES71A6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDB401996BA7945EEA311687F2153B1B.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4624
    • C:\Users\Admin\AppData\Local\Temp\tmp6FE0.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp6FE0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7ef695e2eb00583acd7c520cf107188f.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES71A6.tmp

    Filesize

    1KB

    MD5

    7ec52adbb42e266bfd88df08d33876e8

    SHA1

    588ededfba0735d74ca9ff53c1f54f71d6d09535

    SHA256

    46a224ea8132e18be1fc84e719cbdedd187b84ecfffc5fd2748ae355458937c5

    SHA512

    7d088a97ba98cdf8b3d743235bb15548264761b2066dc82910db811a44d19d48c039ff0dc2c34cdfd7c92c23420e59a3c250d11faebe2da5a16115343a1e0fce

  • C:\Users\Admin\AppData\Local\Temp\bul952hw.0.vb

    Filesize

    14KB

    MD5

    a810c1c1a01ba74e22e6114e03c63af8

    SHA1

    8c6c6139017c2a07065b5929d10e2b8154a48099

    SHA256

    0c62b79458f4d35485d1495f98365cad39abf6965375ee75cdaedccea5ee8a4e

    SHA512

    8dcd6c6024148cdfb1d278ce0f73cd3bb8811d8d37f4f8a651c677cbfb0e7ea2ed65944d09978c46320208f928b8934396be4a0d3b1deb12e3020a57297df77c

  • C:\Users\Admin\AppData\Local\Temp\bul952hw.cmdline

    Filesize

    266B

    MD5

    1120a5ff76e51514a99e2558c08c6e98

    SHA1

    89a0ba8395192d91817276c125e237f326200d7a

    SHA256

    bba89aad2479ca2e230d6e6a5c16091ff3de971d9c09e3cae1553519ac4fc585

    SHA512

    d7a5cb812d3f3c82c8e763b18bbbd6753369d82629a7129ddd6170eeabdaa77b756b5536e1e148f1605416844a8102fbe2f8a4b6e6c2dd29f26ce08a7487db89

  • C:\Users\Admin\AppData\Local\Temp\tmp6FE0.tmp.exe

    Filesize

    78KB

    MD5

    282a0db747e9f3a53aca144741a28bef

    SHA1

    100362f7c663172db69a53889b687c93136ecbde

    SHA256

    11f5f8f04cac5c19175191742163e5967f4788a0b37859a11907706242f3af50

    SHA512

    77678d4f4e8b4620f91fd90faa8c5c52075c3a416c4a9e66f6e87c5088b252d7f094cbbb1958f1dc2ed2655c4b745b478d5cda610c244e995fc0985d1bf69dc4

  • C:\Users\Admin\AppData\Local\Temp\vbcDB401996BA7945EEA311687F2153B1B.TMP

    Filesize

    660B

    MD5

    bbef770c03a40d8d800fd9511a99514d

    SHA1

    cbd3539809dd0c668124e534b024f8c7fc26b90a

    SHA256

    84ea4c6877c63edcdfc268a9caea845f8c0589ce1919e4f63223e5aa7f2ff8f4

    SHA512

    2950b1ef18e2650aba20823b7fac8a7851242618d31aeae32a489fe5127477cabe3bbd10a2f468af520d133fb9b64b9cbeacbeb06d7eab1652df807e173b072d

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2144-27-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/2144-26-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/2144-25-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/2144-22-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4464-8-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4464-18-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4704-23-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4704-0-0x0000000074DE2000-0x0000000074DE3000-memory.dmp

    Filesize

    4KB

  • memory/4704-2-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4704-1-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB