Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/03/2023, 05:48
Behavioral task
behavioral1
Sample
dcbb32405ee05f65b14eeeb946736623.exe
Resource
win7-20230220-en
General
-
Target
dcbb32405ee05f65b14eeeb946736623.exe
-
Size
37KB
-
MD5
dcbb32405ee05f65b14eeeb946736623
-
SHA1
cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
-
SHA256
d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
-
SHA512
d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad
-
SSDEEP
384:b6bZpj6icjri5Z7JAyk/A4wfL3Ze6Yd2rAF+rMRTyN/0L+EcoinblneHQM3epzXq:ubXHJ7k/A4wzZrYYrM+rMRa8NuhOt
Malware Config
Extracted
njrat
im523
welmoroff
0.tcp.eu.ngrok.io:11993
619a2000a3e32d8aaaca3d14ba2e0945
-
reg_key
619a2000a3e32d8aaaca3d14ba2e0945
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 616 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 Nursultan.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 dcbb32405ee05f65b14eeeb946736623.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe Token: 33 1980 Nursultan.exe Token: SeIncBasePriorityPrivilege 1980 Nursultan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1980 2044 dcbb32405ee05f65b14eeeb946736623.exe 28 PID 2044 wrote to memory of 1980 2044 dcbb32405ee05f65b14eeeb946736623.exe 28 PID 2044 wrote to memory of 1980 2044 dcbb32405ee05f65b14eeeb946736623.exe 28 PID 2044 wrote to memory of 1980 2044 dcbb32405ee05f65b14eeeb946736623.exe 28 PID 1980 wrote to memory of 616 1980 Nursultan.exe 29 PID 1980 wrote to memory of 616 1980 Nursultan.exe 29 PID 1980 wrote to memory of 616 1980 Nursultan.exe 29 PID 1980 wrote to memory of 616 1980 Nursultan.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcbb32405ee05f65b14eeeb946736623.exe"C:\Users\Admin\AppData\Local\Temp\dcbb32405ee05f65b14eeeb946736623.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\Nursultan.exe"C:\Users\Admin\AppData\Roaming\Nursultan.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Nursultan.exe" "Nursultan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:616
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5dcbb32405ee05f65b14eeeb946736623
SHA1cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
SHA256d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
SHA512d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad
-
Filesize
37KB
MD5dcbb32405ee05f65b14eeeb946736623
SHA1cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
SHA256d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
SHA512d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad
-
Filesize
37KB
MD5dcbb32405ee05f65b14eeeb946736623
SHA1cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
SHA256d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
SHA512d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad