Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/04/2023, 02:01
Behavioral task
behavioral1
Sample
ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe
Resource
win7-20230220-en
General
-
Target
ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe
-
Size
29KB
-
MD5
387066fa34cff110387fdef8dd7851f6
-
SHA1
c88610c2ae895a36a720947c300282b2b5559b4f
-
SHA256
ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
-
SHA512
0b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265
-
SSDEEP
384:ZSItl77FDFucYfKQCcHN5vljmOmqDIlXHeHNGBsbh0w4wlAokw9OhgOL1vYRGOZD:v77ucYfKQTtzjAqc3eUBKh0p29SgR+Y
Malware Config
Extracted
njrat
0.6.4
HacKed
edge.servep2p.com:69
813b829156a6c5f5b4a93593e8548ffd
-
reg_key
813b829156a6c5f5b4a93593e8548ffd
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 768 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1712 vm3dservicex.exe -
Loads dropped DLL 1 IoCs
pid Process 1480 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe 1712 vm3dservicex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 vm3dservicex.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1712 1480 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe 28 PID 1480 wrote to memory of 1712 1480 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe 28 PID 1480 wrote to memory of 1712 1480 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe 28 PID 1480 wrote to memory of 1712 1480 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe 28 PID 1712 wrote to memory of 768 1712 vm3dservicex.exe 29 PID 1712 wrote to memory of 768 1712 vm3dservicex.exe 29 PID 1712 wrote to memory of 768 1712 vm3dservicex.exe 29 PID 1712 wrote to memory of 768 1712 vm3dservicex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe"C:\Users\Admin\AppData\Local\Temp\ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\vm3dservicex.exe"C:\Users\Admin\AppData\Local\Temp\vm3dservicex.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\vm3dservicex.exe" "vm3dservicex.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:768
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5387066fa34cff110387fdef8dd7851f6
SHA1c88610c2ae895a36a720947c300282b2b5559b4f
SHA256ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
SHA5120b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265
-
Filesize
29KB
MD5387066fa34cff110387fdef8dd7851f6
SHA1c88610c2ae895a36a720947c300282b2b5559b4f
SHA256ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
SHA5120b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265
-
Filesize
29KB
MD5387066fa34cff110387fdef8dd7851f6
SHA1c88610c2ae895a36a720947c300282b2b5559b4f
SHA256ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
SHA5120b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265