Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 22:16 UTC

General

  • Target

    7e25b10edb79b23e598357a9d138ea5e.exe

  • Size

    212KB

  • MD5

    7e25b10edb79b23e598357a9d138ea5e

  • SHA1

    8ac0dabaebfdaba4d13035a2e44609b4a5e04bcd

  • SHA256

    70bc725d2a8756ee10547571a59f859bfd4069460bef66b47259d5c3cce8825b

  • SHA512

    aa070d8614e830fa7c54dd247a762596e55734dcd7be67be43e6130e791f5399a4e8dad427e37d547beeb6cff093f7b8e26817d6ebc3c3cd8e923691caa93173

  • SSDEEP

    3072:3Jacj8v7wQ+ZGx7w8wjjP8I1IU8RjrzzvUWAOZjfKdLnY7:3JPgv7wJZ87wBjYI1IUwrIOZyY7

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Hacked

C2

abdo95.ddns.net:1177

Mutex

ed6e2bf930f6d35b3ac57c049d10ac2c

Attributes
  • reg_key

    ed6e2bf930f6d35b3ac57c049d10ac2c

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e25b10edb79b23e598357a9d138ea5e.exe
    "C:\Users\Admin\AppData\Local\Temp\7e25b10edb79b23e598357a9d138ea5e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c test.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\test.exe
        test.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Users\Admin\AppData\Local\Temp\Explorer.exe
          "C:\Users\Admin\AppData\Local\Temp\Explorer.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2804
  • C:\Windows\SysWOW64\netsh.exe
    netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Explorer.exe" "Explorer.exe" ENABLE
    1⤵
    • Modifies Windows Firewall
    PID:2664

Network

  • flag-us
    DNS
    abdo95.ddns.net
    Explorer.exe
    Remote address:
    8.8.8.8:53
    Request
    abdo95.ddns.net
    IN A
    Response
No results found
  • 8.8.8.8:53
    abdo95.ddns.net
    dns
    Explorer.exe
    61 B
    121 B
    1
    1

    DNS Request

    abdo95.ddns.net

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\test.exe

    Filesize

    29KB

    MD5

    fc42513e45503d510fb011bbb309e51e

    SHA1

    e9741466f6e68dadb9e874f12d5b62fe14693741

    SHA256

    766240fd9026a04e4a7f20240f699133eef24a969e242afdd471ad0a179cefe3

    SHA512

    0f2a88f96a8a47abe062ccca986d2b3d98310374629c9067b19dbfeb73f23ba411b3ca5ae3877684770fb2d25947305b42c38a913a329e6220de6cd5d539a8ca

  • memory/1612-5-0x0000000074AD0000-0x000000007507B000-memory.dmp

    Filesize

    5.7MB

  • memory/1612-6-0x0000000000AC0000-0x0000000000B00000-memory.dmp

    Filesize

    256KB

  • memory/1612-7-0x0000000074AD0000-0x000000007507B000-memory.dmp

    Filesize

    5.7MB

  • memory/1612-16-0x0000000074AD0000-0x000000007507B000-memory.dmp

    Filesize

    5.7MB

  • memory/2612-0-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2612-19-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2804-17-0x0000000074AD0000-0x000000007507B000-memory.dmp

    Filesize

    5.7MB

  • memory/2804-18-0x0000000000E50000-0x0000000000E90000-memory.dmp

    Filesize

    256KB

  • memory/2804-20-0x0000000074AD0000-0x000000007507B000-memory.dmp

    Filesize

    5.7MB

  • memory/2804-21-0x0000000000E50000-0x0000000000E90000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.