Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
101106-01-Redline.exe
windows10-1703-x64
101106-01-Redline.exe
windows10-2004-x64
101106-02-Stealc.exe
windows10-1703-x64
101106-02-Stealc.exe
windows10-2004-x64
101106-03-Ag...la.exe
windows10-1703-x64
101106-03-Ag...la.exe
windows10-2004-x64
101106-04-Warzone.exe
windows10-1703-x64
101106-04-Warzone.exe
windows10-2004-x64
101106-05-Windigo.exe
windows10-1703-x64
71106-05-Windigo.exe
windows10-2004-x64
71106-06-Zgrat.exe
windows10-1703-x64
101106-06-Zgrat.exe
windows10-2004-x64
101106-07-Bl...er.exe
windows10-1703-x64
101106-07-Bl...er.exe
windows10-2004-x64
71106-08-Glupteba.exe
windows10-1703-x64
101106-08-Glupteba.exe
windows10-2004-x64
101106-09-Msfvenom.exe
windows10-1703-x64
101106-09-Msfvenom.exe
windows10-2004-x64
101106-10-Windigo.exe
windows10-1703-x64
71106-10-Windigo.exe
windows10-2004-x64
71106-11-Njrat.exe
windows10-1703-x64
101106-11-Njrat.exe
windows10-2004-x64
101106-12-Gh0st.dll
windows10-1703-x64
11106-12-Gh0st.dll
windows10-2004-x64
1Resubmissions
06/11/2023, 19:37
231106-ybwfxadf81 1006/11/2023, 19:33
231106-x9tjjadf4z 1006/11/2023, 16:18
231106-tr58tscc9y 10Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 16:18
Behavioral task
behavioral1
Sample
1106-01-Redline.exe
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
1106-01-Redline.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral3
Sample
1106-02-Stealc.exe
Resource
win10-20231020-en
Behavioral task
behavioral4
Sample
1106-02-Stealc.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
1106-03-AgentTesla.exe
Resource
win10-20231023-en
Behavioral task
behavioral6
Sample
1106-03-AgentTesla.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
1106-04-Warzone.exe
Resource
win10-20231025-en
Behavioral task
behavioral8
Sample
1106-04-Warzone.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
1106-05-Windigo.exe
Resource
win10-20231020-en
Behavioral task
behavioral10
Sample
1106-05-Windigo.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
1106-06-Zgrat.exe
Resource
win10-20231020-en
Behavioral task
behavioral12
Sample
1106-06-Zgrat.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
1106-07-BlankGrabber.exe
Resource
win10-20231023-en
Behavioral task
behavioral14
Sample
1106-07-BlankGrabber.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
1106-08-Glupteba.exe
Resource
win10-20231025-en
Behavioral task
behavioral16
Sample
1106-08-Glupteba.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
1106-09-Msfvenom.exe
Resource
win10-20231023-en
Behavioral task
behavioral18
Sample
1106-09-Msfvenom.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
1106-10-Windigo.exe
Resource
win10-20231020-en
Behavioral task
behavioral20
Sample
1106-10-Windigo.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
1106-11-Njrat.exe
Resource
win10-20231023-en
Behavioral task
behavioral22
Sample
1106-11-Njrat.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
1106-12-Gh0st.dll
Resource
win10-20231025-en
Behavioral task
behavioral24
Sample
1106-12-Gh0st.dll
Resource
win10v2004-20231023-en
General
-
Target
1106-11-Njrat.exe
-
Size
2.7MB
-
MD5
f6e3aee1f90ebd9fd2035d95cfb1572a
-
SHA1
9e3f5dd7421c68ed101a21678056a0d03a145d1a
-
SHA256
0b4d4ccbb9bef35964350e889dd87d2f5b0cd4e0fdc281af1f11adfbce994209
-
SHA512
437a0a1a485cc07567e149a5de503b2d2312925695824c002d25ad51a7015cfd78c03c962bbcd808793387d7cb3b4008602c70909a067ca29ac18827c5360035
-
SSDEEP
49152:rBZ6v3/0HTj169yWEY969K22VwFHITeeAwxkA:rWv3/0HTj169yWEY969r2VeH
Malware Config
Extracted
njrat
v2.0
Hi can you give money
172.94.4.171:7772
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral22/memory/3448-5-0x0000000006920000-0x000000000695A000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%startupname%.lnk 1106-11-Njrat.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk RegAsm.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 Adobe Reader PDF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe Reader PDF.exe" RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3448 set thread context of 4756 3448 1106-11-Njrat.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4756 3448 1106-11-Njrat.exe 91 PID 3448 wrote to memory of 4756 3448 1106-11-Njrat.exe 91 PID 3448 wrote to memory of 4756 3448 1106-11-Njrat.exe 91 PID 3448 wrote to memory of 4756 3448 1106-11-Njrat.exe 91 PID 3448 wrote to memory of 4756 3448 1106-11-Njrat.exe 91 PID 3448 wrote to memory of 4756 3448 1106-11-Njrat.exe 91 PID 3448 wrote to memory of 4756 3448 1106-11-Njrat.exe 91 PID 4756 wrote to memory of 2092 4756 RegAsm.exe 100 PID 4756 wrote to memory of 2092 4756 RegAsm.exe 100 PID 4756 wrote to memory of 2092 4756 RegAsm.exe 100 PID 4756 wrote to memory of 5004 4756 RegAsm.exe 102 PID 4756 wrote to memory of 5004 4756 RegAsm.exe 102 PID 4756 wrote to memory of 5004 4756 RegAsm.exe 102 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5004 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1106-11-Njrat.exe"C:\Users\Admin\AppData\Local\Temp\1106-11-Njrat.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"3⤵
- Executes dropped EXE
PID:2092
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"3⤵
- Views/modifies file attributes
PID:5004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2