Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
101106-01-Redline.exe
windows7-x64
101106-01-Redline.exe
windows10-2004-x64
101106-02-Stealc.exe
windows7-x64
101106-02-Stealc.exe
windows10-2004-x64
101106-03-Ag...la.exe
windows7-x64
101106-03-Ag...la.exe
windows10-2004-x64
101106-04-Warzone.exe
windows7-x64
101106-04-Warzone.exe
windows10-2004-x64
101106-05-Windigo.exe
windows7-x64
71106-05-Windigo.exe
windows10-2004-x64
71106-06-Zgrat.exe
windows7-x64
101106-06-Zgrat.exe
windows10-2004-x64
101106-07-Bl...er.exe
windows7-x64
71106-07-Bl...er.exe
windows10-2004-x64
71106-08-Glupteba.exe
windows7-x64
101106-08-Glupteba.exe
windows10-2004-x64
101106-09-Msfvenom.exe
windows7-x64
101106-09-Msfvenom.exe
windows10-2004-x64
101106-10-Windigo.exe
windows7-x64
71106-10-Windigo.exe
windows10-2004-x64
71106-11-Njrat.exe
windows7-x64
101106-11-Njrat.exe
windows10-2004-x64
101106-12-Gh0st.dll
windows7-x64
11106-12-Gh0st.dll
windows10-2004-x64
1Resubmissions
06/11/2023, 19:37
231106-ybwfxadf81 1006/11/2023, 19:33
231106-x9tjjadf4z 1006/11/2023, 16:18
231106-tr58tscc9y 10Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06/11/2023, 19:33
Behavioral task
behavioral1
Sample
1106-01-Redline.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1106-01-Redline.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
1106-02-Stealc.exe
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
1106-02-Stealc.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
1106-03-AgentTesla.exe
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
1106-03-AgentTesla.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
1106-04-Warzone.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
1106-04-Warzone.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
1106-05-Windigo.exe
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
1106-05-Windigo.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
1106-06-Zgrat.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
1106-06-Zgrat.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
1106-07-BlankGrabber.exe
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
1106-07-BlankGrabber.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
1106-08-Glupteba.exe
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
1106-08-Glupteba.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
1106-09-Msfvenom.exe
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
1106-09-Msfvenom.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
1106-10-Windigo.exe
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
1106-10-Windigo.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
1106-11-Njrat.exe
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
1106-11-Njrat.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
1106-12-Gh0st.dll
Resource
win7-20231025-en
Behavioral task
behavioral24
Sample
1106-12-Gh0st.dll
Resource
win10v2004-20231020-en
General
-
Target
1106-11-Njrat.exe
-
Size
2.7MB
-
MD5
f6e3aee1f90ebd9fd2035d95cfb1572a
-
SHA1
9e3f5dd7421c68ed101a21678056a0d03a145d1a
-
SHA256
0b4d4ccbb9bef35964350e889dd87d2f5b0cd4e0fdc281af1f11adfbce994209
-
SHA512
437a0a1a485cc07567e149a5de503b2d2312925695824c002d25ad51a7015cfd78c03c962bbcd808793387d7cb3b4008602c70909a067ca29ac18827c5360035
-
SSDEEP
49152:rBZ6v3/0HTj169yWEY969K22VwFHITeeAwxkA:rWv3/0HTj169yWEY969r2VeH
Malware Config
Extracted
njrat
v2.0
Hi can you give money
172.94.4.171:7772
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral21/memory/1280-3-0x0000000002140000-0x000000000217A000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%startupname%.lnk 1106-11-Njrat.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk RegAsm.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 Adobe Reader PDF.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 RegAsm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe Reader PDF.exe" RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1280 set thread context of 2864 1280 1106-11-Njrat.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 1280 wrote to memory of 2864 1280 1106-11-Njrat.exe 28 PID 2864 wrote to memory of 2700 2864 RegAsm.exe 29 PID 2864 wrote to memory of 2700 2864 RegAsm.exe 29 PID 2864 wrote to memory of 2700 2864 RegAsm.exe 29 PID 2864 wrote to memory of 2700 2864 RegAsm.exe 29 PID 2864 wrote to memory of 3040 2864 RegAsm.exe 31 PID 2864 wrote to memory of 3040 2864 RegAsm.exe 31 PID 2864 wrote to memory of 3040 2864 RegAsm.exe 31 PID 2864 wrote to memory of 3040 2864 RegAsm.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3040 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1106-11-Njrat.exe"C:\Users\Admin\AppData\Local\Temp\1106-11-Njrat.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"3⤵
- Executes dropped EXE
PID:2700
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Adobe Reader PDF.exe"3⤵
- Views/modifies file attributes
PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab