Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
5b86cbad21d81626db92220fbed7a465.exe
Resource
win7-20231215-en
General
-
Target
5b86cbad21d81626db92220fbed7a465.exe
-
Size
25KB
-
MD5
5b86cbad21d81626db92220fbed7a465
-
SHA1
124dcfaa2fa3d1bb17af97249ddd49b566fdbfc3
-
SHA256
ef628a6511f0a9fe1effcb71b5ca1fd4be85c85da8fb18d5f30de3c27e8e1bb6
-
SHA512
6297cb2d0592fc25102f98a7703c130eb6fee67c9286a585f115f8252cc02533a32b4ad288ee50331e9e46792c648e1e515c2011170002fb67b8fd61d5984343
-
SSDEEP
384:sv3ZI++mmHgOC69Qlr4XU1lL2IVJinVcVcp0jW9h2HbmdPvo8I6CQYtIdgDxpf:svpwhHB2r/1c4IFpdgwvj1CzI+Fpf
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
flans mod
127.0.0.1:25565
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 5b86cbad21d81626db92220fbed7a465.exe -
Executes dropped EXE 3 IoCs
pid Process 2940 Dllhost.exe 3276 Server.exe 3184 Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4716 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2972 5b86cbad21d81626db92220fbed7a465.exe 2940 Dllhost.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe Token: 33 2940 Dllhost.exe Token: SeIncBasePriorityPrivilege 2940 Dllhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2940 2972 5b86cbad21d81626db92220fbed7a465.exe 88 PID 2972 wrote to memory of 2940 2972 5b86cbad21d81626db92220fbed7a465.exe 88 PID 2940 wrote to memory of 4716 2940 Dllhost.exe 93 PID 2940 wrote to memory of 4716 2940 Dllhost.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b86cbad21d81626db92220fbed7a465.exe"C:\Users\Admin\AppData\Local\Temp\5b86cbad21d81626db92220fbed7a465.exe"1⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Dllhost.exe"C:\Users\Admin\AppData\Local\Temp\Dllhost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe3⤵
- Creates scheduled task(s)
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe1⤵
- Executes dropped EXE
PID:3276
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe1⤵
- Executes dropped EXE
PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8a147915e3a996fdbe10b3a3f1e1bb2
SHA1abc564c1be468d57e700913e7b6cf8f62d421263
SHA2568b96a8557deea66696837af011843d6a82451ba57c8f9b5a2726a70818d6fc7e
SHA51217b42f17ef60a9f625703172763f692e5ed2ca93564a97853dfa72bb0ac6305ef3267aea0b205938e3aa8eac10156d9d4f322b30d0329d92d647bcec6372731c
-
Filesize
25KB
MD55b86cbad21d81626db92220fbed7a465
SHA1124dcfaa2fa3d1bb17af97249ddd49b566fdbfc3
SHA256ef628a6511f0a9fe1effcb71b5ca1fd4be85c85da8fb18d5f30de3c27e8e1bb6
SHA5126297cb2d0592fc25102f98a7703c130eb6fee67c9286a585f115f8252cc02533a32b4ad288ee50331e9e46792c648e1e515c2011170002fb67b8fd61d5984343