Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2023, 23:30

General

  • Target

    94b9a662f8f42a25d8546d8e92da803e.exe

  • Size

    164KB

  • MD5

    94b9a662f8f42a25d8546d8e92da803e

  • SHA1

    030940062e7def70b69b4c1c93fc4eaa44449f0f

  • SHA256

    e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b

  • SHA512

    185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b

  • SSDEEP

    3072:FEwE/wam2GFzsw2PTWEc0FIEb9ik5E4I3:FETfLF5FbH3I3

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe
    "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /Delete /tn NYANP /F
      2⤵
        PID:1304
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 5
        2⤵
        • Creates scheduled task(s)
        PID:1260
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Delete /tn NYAN /F
        2⤵
          PID:1708
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 1
          2⤵
          • Creates scheduled task(s)
          PID:520
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          "C:\Users\Admin\AppData\Local\Temp\Client.exe"
          2⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /tn NYANP /F
            3⤵
              PID:1596
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 5
              3⤵
              • Creates scheduled task(s)
              PID:1080
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Delete /tn NYAN /F
              3⤵
                PID:1764
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
                3⤵
                • Creates scheduled task(s)
                PID:788
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {9DFD19EC-F7D3-418E-98F9-DF1BB8CA108A} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:676
            • C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe
              C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1752
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /Delete /tn NYANP /F
                3⤵
                  PID:1512
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 5
                  3⤵
                  • Creates scheduled task(s)
                  PID:1508
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Delete /tn NYAN /F
                  3⤵
                    PID:1620
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 1
                    3⤵
                    • Creates scheduled task(s)
                    PID:1528
                • C:\Users\Admin\AppData\Local\Temp\Client.exe
                  C:\Users\Admin\AppData\Local\Temp\Client.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:864
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /Delete /tn NYANP /F
                    3⤵
                      PID:752
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 5
                      3⤵
                      • Creates scheduled task(s)
                      PID:1036
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /Delete /tn NYAN /F
                      3⤵
                        PID:920
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
                        3⤵
                        • Creates scheduled task(s)
                        PID:1712
                    • C:\Users\Admin\AppData\Local\Temp\Client.exe
                      C:\Users\Admin\AppData\Local\Temp\Client.exe
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:892
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /Delete /tn NYANP /F
                        3⤵
                          PID:1568
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 5
                          3⤵
                          • Creates scheduled task(s)
                          PID:932
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /Delete /tn NYAN /F
                          3⤵
                            PID:1792
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
                            3⤵
                            • Creates scheduled task(s)
                            PID:1280

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\Client.exe

                        Filesize

                        164KB

                        MD5

                        94b9a662f8f42a25d8546d8e92da803e

                        SHA1

                        030940062e7def70b69b4c1c93fc4eaa44449f0f

                        SHA256

                        e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b

                        SHA512

                        185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b

                      • C:\Users\Admin\AppData\Local\Temp\Client.exe

                        Filesize

                        164KB

                        MD5

                        94b9a662f8f42a25d8546d8e92da803e

                        SHA1

                        030940062e7def70b69b4c1c93fc4eaa44449f0f

                        SHA256

                        e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b

                        SHA512

                        185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b

                      • C:\Users\Admin\AppData\Local\Temp\Client.exe

                        Filesize

                        164KB

                        MD5

                        94b9a662f8f42a25d8546d8e92da803e

                        SHA1

                        030940062e7def70b69b4c1c93fc4eaa44449f0f

                        SHA256

                        e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b

                        SHA512

                        185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b

                      • C:\Users\Admin\AppData\Local\Temp\Client.exe

                        Filesize

                        164KB

                        MD5

                        94b9a662f8f42a25d8546d8e92da803e

                        SHA1

                        030940062e7def70b69b4c1c93fc4eaa44449f0f

                        SHA256

                        e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b

                        SHA512

                        185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe

                        Filesize

                        164KB

                        MD5

                        94b9a662f8f42a25d8546d8e92da803e

                        SHA1

                        030940062e7def70b69b4c1c93fc4eaa44449f0f

                        SHA256

                        e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b

                        SHA512

                        185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b

                      • \Users\Admin\AppData\Local\Temp\Client.exe

                        Filesize

                        164KB

                        MD5

                        94b9a662f8f42a25d8546d8e92da803e

                        SHA1

                        030940062e7def70b69b4c1c93fc4eaa44449f0f

                        SHA256

                        e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b

                        SHA512

                        185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b

                      • memory/864-73-0x0000000000220000-0x0000000000260000-memory.dmp

                        Filesize

                        256KB

                      • memory/892-76-0x0000000000B30000-0x0000000000B70000-memory.dmp

                        Filesize

                        256KB

                      • memory/892-75-0x0000000000B30000-0x0000000000B70000-memory.dmp

                        Filesize

                        256KB

                      • memory/1700-54-0x00000000002A0000-0x00000000002E0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1700-55-0x00000000002A0000-0x00000000002E0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1752-65-0x0000000000650000-0x0000000000690000-memory.dmp

                        Filesize

                        256KB

                      • memory/1752-56-0x0000000000650000-0x0000000000690000-memory.dmp

                        Filesize

                        256KB

                      • memory/1972-66-0x0000000001F90000-0x0000000001FD0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1972-71-0x0000000001F90000-0x0000000001FD0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1972-70-0x0000000001F90000-0x0000000001FD0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1972-69-0x0000000001F90000-0x0000000001FD0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1972-68-0x0000000001F90000-0x0000000001FD0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1972-64-0x0000000001F90000-0x0000000001FD0000-memory.dmp

                        Filesize

                        256KB