Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 03:38

General

  • Target

    4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871.exe

  • Size

    148KB

  • MD5

    038f46069d0a4f29ab44b7c766a173f0

  • SHA1

    b066930a925f89d6a5da9b1cee4c806ff3c3119c

  • SHA256

    4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871

  • SHA512

    78cb743db6f324485234b0a82fb00ae2fbd5aa7375d9777b9897e57a0df82b0be14bc5b4d1e8a9ab265249c6dde9dec247a4b5f1fc71e6010f6881eaa25e5ca5

  • SSDEEP

    3072:iUu32GhNvBO9qCDtLoosE/WIgU1/B65wYEPv6ANSzlWA9hFDZqz:iU82GhNpC2J47Z1/UeNNSzz5q

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

f974a60849f958b913754e5bb1f5dfce

Attributes
  • reg_key

    f974a60849f958b913754e5bb1f5dfce

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871.exe
    "C:\Users\Admin\AppData\Local\Temp\4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871.exe
      C:\Users\Admin\AppData\Local\Temp\4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Users\Admin\AppData\Roaming\winlogon.exe
        "C:\Users\Admin\AppData\Roaming\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Users\Admin\AppData\Roaming\winlogon.exe
          C:\Users\Admin\AppData\Roaming\winlogon.exe
          4⤵
            PID:4504

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871.exe.log

      Filesize

      128B

      MD5

      a5dcc7c9c08af7dddd82be5b036a4416

      SHA1

      4f998ca1526d199e355ffb435bae111a2779b994

      SHA256

      e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5

      SHA512

      56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

    • C:\Users\Admin\AppData\Roaming\winlogon.exe

      Filesize

      148KB

      MD5

      038f46069d0a4f29ab44b7c766a173f0

      SHA1

      b066930a925f89d6a5da9b1cee4c806ff3c3119c

      SHA256

      4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871

      SHA512

      78cb743db6f324485234b0a82fb00ae2fbd5aa7375d9777b9897e57a0df82b0be14bc5b4d1e8a9ab265249c6dde9dec247a4b5f1fc71e6010f6881eaa25e5ca5

    • C:\Users\Admin\AppData\Roaming\winlogon.exe

      Filesize

      148KB

      MD5

      038f46069d0a4f29ab44b7c766a173f0

      SHA1

      b066930a925f89d6a5da9b1cee4c806ff3c3119c

      SHA256

      4a17f958979cdae4b705021e3fae91288d26e9f7a39d935f210325cae0505871

      SHA512

      78cb743db6f324485234b0a82fb00ae2fbd5aa7375d9777b9897e57a0df82b0be14bc5b4d1e8a9ab265249c6dde9dec247a4b5f1fc71e6010f6881eaa25e5ca5

    • memory/368-133-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB

    • memory/368-132-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB

    • memory/368-137-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB

    • memory/2292-143-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB

    • memory/2292-146-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB

    • memory/2292-144-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB

    • memory/4172-135-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4172-142-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB

    • memory/4172-138-0x00000000748E0000-0x0000000074E91000-memory.dmp

      Filesize

      5.7MB