Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2023, 19:02 UTC

General

  • Target

    shadowscripts.exe

  • Size

    1.2MB

  • MD5

    b0a79b29052cc5c816336f4b62284d9a

  • SHA1

    fbc8b1d5abe62d281e80f469bfbc08f106ad0979

  • SHA256

    12e490b358c0fa22c31181112cbef58b4636f287d586b5ffa412facd5fee3693

  • SHA512

    a9aed2651024fa97164db592d835e4276e5465007c44a3cbafd305556f1b36fa966bcdf6e87cdd3d4373f9beaf32164a4dabd657a5523735511b23a55e65563a

  • SSDEEP

    24576:8D7XBCahuVE5ocC6SC8fsXhugahBsCjz3XH8gohXdHI+1o7R:qlCa4emD6SVfmevjDH8dtHzqR

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

stupids

C2

hakim32.ddns.net:2000

hands-social.at.ply.gg:46242

Mutex

d4529f156f8f79f81b02518c9cf09857

Attributes
  • reg_key

    d4529f156f8f79f81b02518c9cf09857

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\shadowscripts.exe
    "C:\Users\Admin\AppData\Local\Temp\shadowscripts.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAZgBkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAegBzACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGcAaAB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGoAYwBrACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
    • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe
      "C:\Users\Admin\AppData\Local\Temp\FreeScript.exe"
      2⤵
      • Executes dropped EXE
      PID:2200
    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe
        "C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:640
    • C:\Users\Admin\AppData\Local\Temp\Server2223.exe
      "C:\Users\Admin\AppData\Local\Temp\Server2223.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Drops autorun.inf file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:2744
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Modifies Windows Firewall
          PID:1628
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:1856

Network

  • flag-us
    DNS
    plan-holder.at.ply.gg
    svhost.exe
    Remote address:
    8.8.8.8:53
    Request
    plan-holder.at.ply.gg
    IN A
    Response
    plan-holder.at.ply.gg
    IN A
    209.25.141.211
  • flag-us
    DNS
    hands-social.at.ply.gg
    server.exe
    Remote address:
    8.8.8.8:53
    Request
    hands-social.at.ply.gg
    IN A
    Response
    hands-social.at.ply.gg
    IN A
    209.25.141.211
  • 209.25.141.211:44833
    plan-holder.at.ply.gg
    svhost.exe
    152 B
    3
  • 209.25.141.211:46242
    hands-social.at.ply.gg
    server.exe
    152 B
    3
  • 209.25.141.211:44833
    hands-social.at.ply.gg
    svhost.exe
    152 B
    3
  • 209.25.141.211:46242
    hands-social.at.ply.gg
    server.exe
    152 B
    3
  • 209.25.141.211:44833
    hands-social.at.ply.gg
    svhost.exe
    152 B
    3
  • 209.25.141.211:46242
    hands-social.at.ply.gg
    server.exe
    152 B
    3
  • 209.25.141.211:44833
    hands-social.at.ply.gg
    svhost.exe
    152 B
    3
  • 209.25.141.211:46242
    hands-social.at.ply.gg
    server.exe
    152 B
    3
  • 209.25.141.211:44833
    hands-social.at.ply.gg
    svhost.exe
    152 B
    3
  • 209.25.141.211:46242
    hands-social.at.ply.gg
    server.exe
    152 B
    3
  • 209.25.141.211:44833
    hands-social.at.ply.gg
    svhost.exe
    152 B
    3
  • 209.25.141.211:46242
    hands-social.at.ply.gg
    server.exe
    152 B
    3
  • 209.25.141.211:44833
    hands-social.at.ply.gg
    svhost.exe
    152 B
    3
  • 8.8.8.8:53
    plan-holder.at.ply.gg
    dns
    svhost.exe
    67 B
    83 B
    1
    1

    DNS Request

    plan-holder.at.ply.gg

    DNS Response

    209.25.141.211

  • 8.8.8.8:53
    hands-social.at.ply.gg
    dns
    server.exe
    68 B
    84 B
    1
    1

    DNS Request

    hands-social.at.ply.gg

    DNS Response

    209.25.141.211

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe

    Filesize

    913KB

    MD5

    799c188cf6df366f4c0f98b8800a4977

    SHA1

    161d6006518879ecba6cf45b29599992d8eadfce

    SHA256

    32e96ac5e9d2f869ad11ca48401ca8eaeb520027751427145ddb5ab43bce1841

    SHA512

    32a3749f4ef40e9345644c84666207a7c4f0369274cc18f71eecd1eeb6ea22733bc4cc6751f7281bbdff7e0a2187209a6c00653a95d6d39adb4dab06f355e1b1

  • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\melt.txt

    Filesize

    44B

    MD5

    0371617c0582de75186bbd471f349171

    SHA1

    3573ac51c9f32cd1979def85242d3a90bdc9c871

    SHA256

    9979119a3599ecc2dd4149131be8345469e09cba46726f203795d9563d3c0d4a

    SHA512

    f83f66c907bb2a3f0fb3b3a535423e8aed122f1ba4c1a9aa65c84b9649a50ef6871b1b236913e16e3980372663fba969f514c19bd4b83a9a6d9e33bbcb520115

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Roaming\Microsoft\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Roaming\Microsoft\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • C:\Users\Admin\AppData\Roaming\app

    Filesize

    5B

    MD5

    d43c5b07c128b116b7bc8faf7b8efa9d

    SHA1

    dd3540ad4ae14b21b665d108cf4570c2dfa6a6fa

    SHA256

    80ad1cc7b3a784dad618a445af0c8cf3efa903f82a814756f2aaa7b57f45791f

    SHA512

    618b01e2b808e1954d011635dfdf63bc75855145208fc5cae33ce09c7e5b43cf978f6511beb311765e6920e728a290c9f9ced7563e40e8ff8d093d50fdc18334

  • C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • \Users\Admin\AppData\Local\Temp\FreeScript.exe

    Filesize

    913KB

    MD5

    799c188cf6df366f4c0f98b8800a4977

    SHA1

    161d6006518879ecba6cf45b29599992d8eadfce

    SHA256

    32e96ac5e9d2f869ad11ca48401ca8eaeb520027751427145ddb5ab43bce1841

    SHA512

    32a3749f4ef40e9345644c84666207a7c4f0369274cc18f71eecd1eeb6ea22733bc4cc6751f7281bbdff7e0a2187209a6c00653a95d6d39adb4dab06f355e1b1

  • \Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\Server2223.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    cb7303205cfb306b5f41820e248a9a5a

    SHA1

    46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

    SHA256

    6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

    SHA512

    87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

  • \Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    183KB

    MD5

    9e74e4f56a6568d89660627d2ea95ec0

    SHA1

    41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

    SHA256

    7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

    SHA512

    f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

  • memory/640-135-0x00000000020D0000-0x0000000002150000-memory.dmp

    Filesize

    512KB

  • memory/640-116-0x00000000020D0000-0x0000000002150000-memory.dmp

    Filesize

    512KB

  • memory/640-112-0x0000000000820000-0x0000000000854000-memory.dmp

    Filesize

    208KB

  • memory/640-117-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/640-118-0x00000000020D0000-0x0000000002150000-memory.dmp

    Filesize

    512KB

  • memory/640-114-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/640-136-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1476-98-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1476-81-0x0000000000850000-0x0000000000890000-memory.dmp

    Filesize

    256KB

  • memory/1476-80-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1532-86-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-78-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-104-0x0000000002020000-0x00000000020A0000-memory.dmp

    Filesize

    512KB

  • memory/1532-79-0x0000000002020000-0x00000000020A0000-memory.dmp

    Filesize

    512KB

  • memory/1532-115-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-113-0x000007FEF6270000-0x000007FEF6C0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1532-75-0x00000000008D0000-0x0000000000904000-memory.dmp

    Filesize

    208KB

  • memory/2176-105-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-85-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2176-84-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2176-83-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2176-82-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-99-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-100-0x00000000003D0000-0x0000000000410000-memory.dmp

    Filesize

    256KB

  • memory/3036-133-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-134-0x00000000003D0000-0x0000000000410000-memory.dmp

    Filesize

    256KB

  • memory/3036-101-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.