Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 18:01

General

  • Target

    548A4036ED72D3479BA73BB16B540198.exe

  • Size

    1.1MB

  • MD5

    548a4036ed72d3479ba73bb16b540198

  • SHA1

    2f13d78e0a284eee8673aff586582050f72e4f82

  • SHA256

    f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

  • SHA512

    97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

  • SSDEEP

    24576:7gc2ZZ58NY+7pxrdVzZEUbIBd6U1EtuhgrSiDj2ni:7hFNY+7LdHPI91EagOi

Score
10/10

Malware Config

Extracted

Family

njrat

C2

hakim32.ddns.net:2000

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe
    "C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops autorun.inf file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:3856
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:5016
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Modifies Windows Firewall
        PID:3500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    1.1MB

    MD5

    548a4036ed72d3479ba73bb16b540198

    SHA1

    2f13d78e0a284eee8673aff586582050f72e4f82

    SHA256

    f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

    SHA512

    97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    1.1MB

    MD5

    548a4036ed72d3479ba73bb16b540198

    SHA1

    2f13d78e0a284eee8673aff586582050f72e4f82

    SHA256

    f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

    SHA512

    97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    1.1MB

    MD5

    548a4036ed72d3479ba73bb16b540198

    SHA1

    2f13d78e0a284eee8673aff586582050f72e4f82

    SHA256

    f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

    SHA512

    97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

  • C:\Users\Admin\AppData\Roaming\app

    Filesize

    5B

    MD5

    02b81b0cbe1faaa1fa62d5fc876ab443

    SHA1

    d473cfe21fb1f188689415b0bdd239688f8fddd9

    SHA256

    e7e9e2c247bc872bacce77661c78f001a17d70ee3130a9016a5818da9da00cdb

    SHA512

    592ab5b200d4c560951cb70288dc1b7a562f0cbfaee01ce03076b6934d537b88575c2e1e0fedcc05db95e6c224ca739923e7d74f9165e683f3fbad7bbf641784

  • memory/1740-16-0x0000000000E40000-0x00000000011BE000-memory.dmp

    Filesize

    3.5MB

  • memory/1740-3-0x0000000003ED0000-0x0000000003EE0000-memory.dmp

    Filesize

    64KB

  • memory/1740-1-0x0000000074D40000-0x00000000752F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-2-0x0000000074D40000-0x00000000752F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-0-0x0000000000E40000-0x00000000011BE000-memory.dmp

    Filesize

    3.5MB

  • memory/1740-18-0x0000000074D40000-0x00000000752F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4832-20-0x0000000074D40000-0x00000000752F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4832-19-0x00000000031C0000-0x00000000031D0000-memory.dmp

    Filesize

    64KB

  • memory/4832-17-0x0000000074D40000-0x00000000752F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4832-13-0x00000000000C0000-0x000000000043E000-memory.dmp

    Filesize

    3.5MB

  • memory/4832-36-0x00000000000C0000-0x000000000043E000-memory.dmp

    Filesize

    3.5MB

  • memory/4832-37-0x0000000074D40000-0x00000000752F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4832-38-0x00000000031C0000-0x00000000031D0000-memory.dmp

    Filesize

    64KB

  • memory/4832-39-0x0000000074D40000-0x00000000752F1000-memory.dmp

    Filesize

    5.7MB