Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe
Resource
win10v2004-20220901-en
General
-
Target
9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe
-
Size
104KB
-
MD5
612c66a36515026a56be7247c26fd640
-
SHA1
6922a1cc14516d538e9e4eceb7e5fd8d1b13b15e
-
SHA256
9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0
-
SHA512
144ddf3583f3beb070da6af93c7aa568dfc48f312be6e233be45b1f11d0c68aea27671cbfc0da1ce260d43a96b352a34c296490f2addd345aba8ddb1eaddb9f5
-
SSDEEP
1536:fv35cLcZpzG087Pb5xAr9DoM25s5jKXQqoXihO+NA43FizmPlQ:fugx8zb5OpDoSU2i0+fwOlQ
Malware Config
Extracted
njrat
0.7d
نورتني حبيبي
pooi222.no-ip.biz:7777
f478c0e74b869a31fe8f76f9aaf004a8
-
reg_key
f478c0e74b869a31fe8f76f9aaf004a8
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1504 System.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1248 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\f478c0e74b869a31fe8f76f9aaf004a8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f478c0e74b869a31fe8f76f9aaf004a8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe Token: 33 1504 System.exe Token: SeIncBasePriorityPrivilege 1504 System.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1504 2008 9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe 27 PID 2008 wrote to memory of 1504 2008 9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe 27 PID 2008 wrote to memory of 1504 2008 9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe 27 PID 1504 wrote to memory of 1248 1504 System.exe 28 PID 1504 wrote to memory of 1248 1504 System.exe 28 PID 1504 wrote to memory of 1248 1504 System.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe"C:\Users\Admin\AppData\Local\Temp\9053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\System.exe" "System.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1248
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5612c66a36515026a56be7247c26fd640
SHA16922a1cc14516d538e9e4eceb7e5fd8d1b13b15e
SHA2569053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0
SHA512144ddf3583f3beb070da6af93c7aa568dfc48f312be6e233be45b1f11d0c68aea27671cbfc0da1ce260d43a96b352a34c296490f2addd345aba8ddb1eaddb9f5
-
Filesize
104KB
MD5612c66a36515026a56be7247c26fd640
SHA16922a1cc14516d538e9e4eceb7e5fd8d1b13b15e
SHA2569053bf7c3206713597481ba4563833c03dece95115661c100bf3f54c9c5d57f0
SHA512144ddf3583f3beb070da6af93c7aa568dfc48f312be6e233be45b1f11d0c68aea27671cbfc0da1ce260d43a96b352a34c296490f2addd345aba8ddb1eaddb9f5