Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
101106-01-Redline.exe
windows10-1703-x64
101106-01-Redline.exe
windows10-2004-x64
101106-02-Stealc.exe
windows10-1703-x64
101106-02-Stealc.exe
windows10-2004-x64
101106-03-Ag...la.exe
windows10-1703-x64
101106-03-Ag...la.exe
windows10-2004-x64
101106-04-Warzone.exe
windows10-1703-x64
101106-04-Warzone.exe
windows10-2004-x64
101106-05-Windigo.exe
windows10-1703-x64
71106-05-Windigo.exe
windows10-2004-x64
71106-06-Zgrat.exe
windows10-1703-x64
101106-06-Zgrat.exe
windows10-2004-x64
101106-07-Bl...er.exe
windows10-1703-x64
101106-07-Bl...er.exe
windows10-2004-x64
71106-08-Glupteba.exe
windows10-1703-x64
101106-08-Glupteba.exe
windows10-2004-x64
101106-09-Msfvenom.exe
windows10-1703-x64
101106-09-Msfvenom.exe
windows10-2004-x64
101106-10-Windigo.exe
windows10-1703-x64
71106-10-Windigo.exe
windows10-2004-x64
71106-11-Njrat.exe
windows10-1703-x64
101106-11-Njrat.exe
windows10-2004-x64
101106-12-Gh0st.dll
windows10-1703-x64
11106-12-Gh0st.dll
windows10-2004-x64
1Resubmissions
06/11/2023, 19:37
231106-ybwfxadf81 1006/11/2023, 19:33
231106-x9tjjadf4z 1006/11/2023, 16:18
231106-tr58tscc9y 10Analysis
-
max time kernel
123s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
06/11/2023, 16:18
Behavioral task
behavioral1
Sample
1106-01-Redline.exe
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
1106-01-Redline.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral3
Sample
1106-02-Stealc.exe
Resource
win10-20231020-en
Behavioral task
behavioral4
Sample
1106-02-Stealc.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
1106-03-AgentTesla.exe
Resource
win10-20231023-en
Behavioral task
behavioral6
Sample
1106-03-AgentTesla.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
1106-04-Warzone.exe
Resource
win10-20231025-en
Behavioral task
behavioral8
Sample
1106-04-Warzone.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
1106-05-Windigo.exe
Resource
win10-20231020-en
Behavioral task
behavioral10
Sample
1106-05-Windigo.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
1106-06-Zgrat.exe
Resource
win10-20231020-en
Behavioral task
behavioral12
Sample
1106-06-Zgrat.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
1106-07-BlankGrabber.exe
Resource
win10-20231023-en
Behavioral task
behavioral14
Sample
1106-07-BlankGrabber.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
1106-08-Glupteba.exe
Resource
win10-20231025-en
Behavioral task
behavioral16
Sample
1106-08-Glupteba.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
1106-09-Msfvenom.exe
Resource
win10-20231023-en
Behavioral task
behavioral18
Sample
1106-09-Msfvenom.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
1106-10-Windigo.exe
Resource
win10-20231020-en
Behavioral task
behavioral20
Sample
1106-10-Windigo.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
1106-11-Njrat.exe
Resource
win10-20231023-en
Behavioral task
behavioral22
Sample
1106-11-Njrat.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
1106-12-Gh0st.dll
Resource
win10-20231025-en
Behavioral task
behavioral24
Sample
1106-12-Gh0st.dll
Resource
win10v2004-20231023-en
General
-
Target
1106-11-Njrat.exe
-
Size
2.7MB
-
MD5
f6e3aee1f90ebd9fd2035d95cfb1572a
-
SHA1
9e3f5dd7421c68ed101a21678056a0d03a145d1a
-
SHA256
0b4d4ccbb9bef35964350e889dd87d2f5b0cd4e0fdc281af1f11adfbce994209
-
SHA512
437a0a1a485cc07567e149a5de503b2d2312925695824c002d25ad51a7015cfd78c03c962bbcd808793387d7cb3b4008602c70909a067ca29ac18827c5360035
-
SSDEEP
49152:rBZ6v3/0HTj169yWEY969K22VwFHITeeAwxkA:rWv3/0HTj169yWEY969r2VeH
Malware Config
Extracted
njrat
v2.0
Hi can you give money
172.94.4.171:7772
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral21/memory/2900-5-0x0000000005E10000-0x0000000005E4A000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%startupname%.lnk 1106-11-Njrat.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk RegAsm.exe -
Executes dropped EXE 1 IoCs
pid Process 4312 Adobe Reader PDF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2184424523-918736138-622003966-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe Reader PDF.exe" RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 320 2900 1106-11-Njrat.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2900 wrote to memory of 320 2900 1106-11-Njrat.exe 70 PID 2900 wrote to memory of 320 2900 1106-11-Njrat.exe 70 PID 2900 wrote to memory of 320 2900 1106-11-Njrat.exe 70 PID 2900 wrote to memory of 320 2900 1106-11-Njrat.exe 70 PID 2900 wrote to memory of 320 2900 1106-11-Njrat.exe 70 PID 2900 wrote to memory of 320 2900 1106-11-Njrat.exe 70 PID 2900 wrote to memory of 320 2900 1106-11-Njrat.exe 70 PID 320 wrote to memory of 4312 320 RegAsm.exe 71 PID 320 wrote to memory of 4312 320 RegAsm.exe 71 PID 320 wrote to memory of 4312 320 RegAsm.exe 71 PID 320 wrote to memory of 4252 320 RegAsm.exe 72 PID 320 wrote to memory of 4252 320 RegAsm.exe 72 PID 320 wrote to memory of 4252 320 RegAsm.exe 72 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4252 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1106-11-Njrat.exe"C:\Users\Admin\AppData\Local\Temp\1106-11-Njrat.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"3⤵
- Executes dropped EXE
PID:4312
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"3⤵
- Views/modifies file attributes
PID:4252
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab