Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 02:01
Behavioral task
behavioral1
Sample
ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe
Resource
win7-20230220-en
General
-
Target
ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe
-
Size
29KB
-
MD5
387066fa34cff110387fdef8dd7851f6
-
SHA1
c88610c2ae895a36a720947c300282b2b5559b4f
-
SHA256
ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
-
SHA512
0b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265
-
SSDEEP
384:ZSItl77FDFucYfKQCcHN5vljmOmqDIlXHeHNGBsbh0w4wlAokw9OhgOL1vYRGOZD:v77ucYfKQTtzjAqc3eUBKh0p29SgR+Y
Malware Config
Extracted
njrat
0.6.4
HacKed
edge.servep2p.com:69
813b829156a6c5f5b4a93593e8548ffd
-
reg_key
813b829156a6c5f5b4a93593e8548ffd
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4128 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe -
Executes dropped EXE 1 IoCs
pid Process 3340 vm3dservicex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe 3340 vm3dservicex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3340 vm3dservicex.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2028 wrote to memory of 3340 2028 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe 83 PID 2028 wrote to memory of 3340 2028 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe 83 PID 2028 wrote to memory of 3340 2028 ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe 83 PID 3340 wrote to memory of 4128 3340 vm3dservicex.exe 84 PID 3340 wrote to memory of 4128 3340 vm3dservicex.exe 84 PID 3340 wrote to memory of 4128 3340 vm3dservicex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe"C:\Users\Admin\AppData\Local\Temp\ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\vm3dservicex.exe"C:\Users\Admin\AppData\Local\Temp\vm3dservicex.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\vm3dservicex.exe" "vm3dservicex.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4128
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5387066fa34cff110387fdef8dd7851f6
SHA1c88610c2ae895a36a720947c300282b2b5559b4f
SHA256ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
SHA5120b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265
-
Filesize
29KB
MD5387066fa34cff110387fdef8dd7851f6
SHA1c88610c2ae895a36a720947c300282b2b5559b4f
SHA256ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
SHA5120b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265
-
Filesize
29KB
MD5387066fa34cff110387fdef8dd7851f6
SHA1c88610c2ae895a36a720947c300282b2b5559b4f
SHA256ff7c120fbef25763588b82d27ffa2c3ac04dca2665f6f5d5e3aa0911b7a29012
SHA5120b7c4b53ab0aa0ab26acafa85dad1a51853eb3cb1d949e07662126857d69b390d0141a87009f68356fd9bc1dc69de6823a8385b9f0555a92311849f585ad6265