Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
548A4036ED72D3479BA73BB16B540198.exe
Resource
win7-20230831-en
General
-
Target
548A4036ED72D3479BA73BB16B540198.exe
-
Size
1.1MB
-
MD5
548a4036ed72d3479ba73bb16b540198
-
SHA1
2f13d78e0a284eee8673aff586582050f72e4f82
-
SHA256
f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
-
SHA512
97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
SSDEEP
24576:7gc2ZZ58NY+7pxrdVzZEUbIBd6U1EtuhgrSiDj2ni:7hFNY+7LdHPI91EagOi
Malware Config
Extracted
njrat
hakim32.ddns.net:2000
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 3856 netsh.exe 5016 netsh.exe 3500 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 548A4036ED72D3479BA73BB16B540198.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beeb0f76ea209c7775b2f9385beb7b67Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beeb0f76ea209c7775b2f9385beb7b67Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 4832 server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf server.exe File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 1740 548A4036ED72D3479BA73BB16B540198.exe 1740 548A4036ED72D3479BA73BB16B540198.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1740 548A4036ED72D3479BA73BB16B540198.exe 1740 548A4036ED72D3479BA73BB16B540198.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4832 server.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe Token: 33 4832 server.exe Token: SeIncBasePriorityPrivilege 4832 server.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1740 548A4036ED72D3479BA73BB16B540198.exe 4832 server.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 4832 1740 548A4036ED72D3479BA73BB16B540198.exe 83 PID 1740 wrote to memory of 4832 1740 548A4036ED72D3479BA73BB16B540198.exe 83 PID 1740 wrote to memory of 4832 1740 548A4036ED72D3479BA73BB16B540198.exe 83 PID 4832 wrote to memory of 3856 4832 server.exe 84 PID 4832 wrote to memory of 3856 4832 server.exe 84 PID 4832 wrote to memory of 3856 4832 server.exe 84 PID 4832 wrote to memory of 3500 4832 server.exe 89 PID 4832 wrote to memory of 3500 4832 server.exe 89 PID 4832 wrote to memory of 3500 4832 server.exe 89 PID 4832 wrote to memory of 5016 4832 server.exe 88 PID 4832 wrote to memory of 5016 4832 server.exe 88 PID 4832 wrote to memory of 5016 4832 server.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe"C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3856
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:5016
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies Windows Firewall
PID:3500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
Filesize
5B
MD502b81b0cbe1faaa1fa62d5fc876ab443
SHA1d473cfe21fb1f188689415b0bdd239688f8fddd9
SHA256e7e9e2c247bc872bacce77661c78f001a17d70ee3130a9016a5818da9da00cdb
SHA512592ab5b200d4c560951cb70288dc1b7a562f0cbfaee01ce03076b6934d537b88575c2e1e0fedcc05db95e6c224ca739923e7d74f9165e683f3fbad7bbf641784