Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2023, 18:01

General

  • Target

    131cc4da76d323e1792e458585a9161f.exe

  • Size

    70KB

  • MD5

    131cc4da76d323e1792e458585a9161f

  • SHA1

    2391bf26f9f880672a3469d8137fdd9c0daacd30

  • SHA256

    35822e68e8334cb47ca9cf01a80ec85047fbf6218298a4c4ee08b41b02bb9658

  • SHA512

    5c5b62217c04770f18e108b5623e0302329dceb28a695fe8bad316b9d8787aaa0dcf5f056bcc223d600aa45348c8e857e4bc48b56b878d3117e30afc64d0f1a4

  • SSDEEP

    768:zdlo/TaYmBcU7BKvk7m+8RoqdTQ+UzpvCHtnDvk7m+8RoqdTQ+UzpvCHtn2:zdoTsBrd7mvR7dTupvcS7mvR7dTupvcg

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

tyfdfdfs.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\131cc4da76d323e1792e458585a9161f.exe
    "C:\Users\Admin\AppData\Local\Temp\131cc4da76d323e1792e458585a9161f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2264
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      PID:2416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • memory/1992-58-0x0000000002020000-0x00000000020A0000-memory.dmp

    Filesize

    512KB

  • memory/1992-57-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/1992-56-0x0000000002020000-0x00000000020A0000-memory.dmp

    Filesize

    512KB

  • memory/1992-55-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/1992-54-0x00000000001E0000-0x00000000001EC000-memory.dmp

    Filesize

    48KB

  • memory/1992-70-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-79-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-68-0x0000000000F30000-0x0000000000F38000-memory.dmp

    Filesize

    32KB

  • memory/2264-72-0x0000000000A40000-0x0000000000AC0000-memory.dmp

    Filesize

    512KB

  • memory/2264-71-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-73-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-81-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2264-80-0x0000000000A40000-0x0000000000AC0000-memory.dmp

    Filesize

    512KB

  • memory/2416-69-0x0000000000370000-0x0000000000382000-memory.dmp

    Filesize

    72KB

  • memory/2416-77-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2416-76-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2416-75-0x0000000000A40000-0x0000000000AC0000-memory.dmp

    Filesize

    512KB

  • memory/2416-74-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB