Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:17
Behavioral task
behavioral1
Sample
de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe
Resource
win7-20220812-en
General
-
Target
de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe
-
Size
29KB
-
MD5
28250c94c7cfdef4561173fb79c80dd5
-
SHA1
de82aeb67fada6f57a05519de33b0160b9cb09c7
-
SHA256
de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612
-
SHA512
2e707312bff0da419578793f307f65d3c5f97a1c60784855c5c5514a0b6f04d022220ec261794c46fead1488248ec9a8ee26b1c377db6e9d893fec665f6b7e3f
-
SSDEEP
384:tN2nLNl73t5otQMOdePp5TdNZmGmqD8ZneQqGBsbh0w4wlAokw9OhgOL1vYRGOZ1:tu7jo2MzBvb4qcneQBKh0p29SgR7l
Malware Config
Extracted
njrat
0.6.4
HacKed
rayan100010001000.no-ip.biz:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1940 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1136 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1440 de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe 1940 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1940 Trojan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1940 1440 de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe 28 PID 1440 wrote to memory of 1940 1440 de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe 28 PID 1440 wrote to memory of 1940 1440 de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe 28 PID 1440 wrote to memory of 1940 1440 de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe 28 PID 1940 wrote to memory of 1136 1940 Trojan.exe 29 PID 1940 wrote to memory of 1136 1940 Trojan.exe 29 PID 1940 wrote to memory of 1136 1940 Trojan.exe 29 PID 1940 wrote to memory of 1136 1940 Trojan.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe"C:\Users\Admin\AppData\Local\Temp\de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1136
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD528250c94c7cfdef4561173fb79c80dd5
SHA1de82aeb67fada6f57a05519de33b0160b9cb09c7
SHA256de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612
SHA5122e707312bff0da419578793f307f65d3c5f97a1c60784855c5c5514a0b6f04d022220ec261794c46fead1488248ec9a8ee26b1c377db6e9d893fec665f6b7e3f
-
Filesize
29KB
MD528250c94c7cfdef4561173fb79c80dd5
SHA1de82aeb67fada6f57a05519de33b0160b9cb09c7
SHA256de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612
SHA5122e707312bff0da419578793f307f65d3c5f97a1c60784855c5c5514a0b6f04d022220ec261794c46fead1488248ec9a8ee26b1c377db6e9d893fec665f6b7e3f
-
Filesize
29KB
MD528250c94c7cfdef4561173fb79c80dd5
SHA1de82aeb67fada6f57a05519de33b0160b9cb09c7
SHA256de0bd57617ea6b8e3354df4d3551eb5fc01954fab7ca2f697fe0e665048eb612
SHA5122e707312bff0da419578793f307f65d3c5f97a1c60784855c5c5514a0b6f04d022220ec261794c46fead1488248ec9a8ee26b1c377db6e9d893fec665f6b7e3f