Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 05:48
Behavioral task
behavioral1
Sample
dcbb32405ee05f65b14eeeb946736623.exe
Resource
win7-20230220-en
General
-
Target
dcbb32405ee05f65b14eeeb946736623.exe
-
Size
37KB
-
MD5
dcbb32405ee05f65b14eeeb946736623
-
SHA1
cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
-
SHA256
d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
-
SHA512
d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad
-
SSDEEP
384:b6bZpj6icjri5Z7JAyk/A4wfL3Ze6Yd2rAF+rMRTyN/0L+EcoinblneHQM3epzXq:ubXHJ7k/A4wzZrYYrM+rMRa8NuhOt
Malware Config
Extracted
njrat
im523
welmoroff
0.tcp.eu.ngrok.io:11993
619a2000a3e32d8aaaca3d14ba2e0945
-
reg_key
619a2000a3e32d8aaaca3d14ba2e0945
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3732 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation dcbb32405ee05f65b14eeeb946736623.exe -
Executes dropped EXE 1 IoCs
pid Process 4320 Nursultan.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe Token: 33 4320 Nursultan.exe Token: SeIncBasePriorityPrivilege 4320 Nursultan.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3512 wrote to memory of 4320 3512 dcbb32405ee05f65b14eeeb946736623.exe 88 PID 3512 wrote to memory of 4320 3512 dcbb32405ee05f65b14eeeb946736623.exe 88 PID 3512 wrote to memory of 4320 3512 dcbb32405ee05f65b14eeeb946736623.exe 88 PID 4320 wrote to memory of 3732 4320 Nursultan.exe 92 PID 4320 wrote to memory of 3732 4320 Nursultan.exe 92 PID 4320 wrote to memory of 3732 4320 Nursultan.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcbb32405ee05f65b14eeeb946736623.exe"C:\Users\Admin\AppData\Local\Temp\dcbb32405ee05f65b14eeeb946736623.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Roaming\Nursultan.exe"C:\Users\Admin\AppData\Roaming\Nursultan.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Nursultan.exe" "Nursultan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3732
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5dcbb32405ee05f65b14eeeb946736623
SHA1cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
SHA256d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
SHA512d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad
-
Filesize
37KB
MD5dcbb32405ee05f65b14eeeb946736623
SHA1cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
SHA256d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
SHA512d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad
-
Filesize
37KB
MD5dcbb32405ee05f65b14eeeb946736623
SHA1cc73493e9d5cd12d9e1c96e22c5581a293bf83bf
SHA256d29c210fb38115e7dbab2db78822979b2227a2cdf9809be230bb1af40125b2e3
SHA512d1c4d752a2d3e486eb1a11090cc11e9f54b457c535d51514ef8fbcfbc914d421c6811b47741669e5cba5dff02fc3c4cd2e6209d91732e3087008a75bf4cf4dad