Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
240s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe
Resource
win10v2004-20221111-en
General
-
Target
c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe
-
Size
510KB
-
MD5
de5594d65b1c39567fcd695a9a22821d
-
SHA1
106fbb1e33137ccd8afd7b7fcb07c59680c33319
-
SHA256
c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1
-
SHA512
1b19ea43c8b404e583c2936208b20d17a63100dd86e309750ec6adf8d913811c030f77ab692aefd56ddb8eeb97713b13515c64fb7904ce91eb10e1b89d2deac4
-
SSDEEP
3072:v6tmSB6CoVYJC0WrFqQe2rYsk/C57x2p2TLmt9U/E0yq2ZCIjotGkUKBbA:v7a41eHRK57Ue/EP/MpJ
Malware Config
Extracted
njrat
0.7d
Dr-Doser
first1one.ddns.net:1177
544fcef8aa17198ed1d025b4643ddcbe
-
reg_key
544fcef8aa17198ed1d025b4643ddcbe
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 924 facebook hack 2015..exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 592 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\544fcef8aa17198ed1d025b4643ddcbe.exe facebook hack 2015..exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\544fcef8aa17198ed1d025b4643ddcbe.exe facebook hack 2015..exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\544fcef8aa17198ed1d025b4643ddcbe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\facebook hack 2015..exe\" .." facebook hack 2015..exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\544fcef8aa17198ed1d025b4643ddcbe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\facebook hack 2015..exe\" .." facebook hack 2015..exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe Token: 33 924 facebook hack 2015..exe Token: SeIncBasePriorityPrivilege 924 facebook hack 2015..exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 672 wrote to memory of 924 672 c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe 28 PID 672 wrote to memory of 924 672 c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe 28 PID 672 wrote to memory of 924 672 c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe 28 PID 924 wrote to memory of 592 924 facebook hack 2015..exe 29 PID 924 wrote to memory of 592 924 facebook hack 2015..exe 29 PID 924 wrote to memory of 592 924 facebook hack 2015..exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe"C:\Users\Admin\AppData\Local\Temp\c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\facebook hack 2015..exe"C:\Users\Admin\AppData\Local\Temp\facebook hack 2015..exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\facebook hack 2015..exe" "facebook hack 2015..exe" ENABLE3⤵
- Modifies Windows Firewall
PID:592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
510KB
MD5de5594d65b1c39567fcd695a9a22821d
SHA1106fbb1e33137ccd8afd7b7fcb07c59680c33319
SHA256c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1
SHA5121b19ea43c8b404e583c2936208b20d17a63100dd86e309750ec6adf8d913811c030f77ab692aefd56ddb8eeb97713b13515c64fb7904ce91eb10e1b89d2deac4
-
Filesize
510KB
MD5de5594d65b1c39567fcd695a9a22821d
SHA1106fbb1e33137ccd8afd7b7fcb07c59680c33319
SHA256c13fa7162bf6014babbf714fb350200f5e9d0c68194e03aad1becf25e10111f1
SHA5121b19ea43c8b404e583c2936208b20d17a63100dd86e309750ec6adf8d913811c030f77ab692aefd56ddb8eeb97713b13515c64fb7904ce91eb10e1b89d2deac4