Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
b9bab88f37b74a18b232fd06e16a59be.exe
Resource
win7-20240215-en
General
-
Target
b9bab88f37b74a18b232fd06e16a59be.exe
-
Size
72KB
-
MD5
b9bab88f37b74a18b232fd06e16a59be
-
SHA1
3c8510c55af0e68e466827395edfd2a866365976
-
SHA256
7b64dc11fee888e4ce1a7e23292b7771b6d334589e2d3c133308d3e1b9223b30
-
SHA512
8bde608701f79d1de29dc9cb7c35574166eae535b07b4b1d4cd21acc94fa8f1db1df95017e006cd581cd2d66216c2e55c4a50b0e87b24e33b63578c499724385
-
SSDEEP
1536:s/i0wcTZAVpAP8OhljOhcWPN5GzHac5IX8KgZp6m:s/ilclYpAPhhljOhcWPN5GzHac5TDZQm
Malware Config
Extracted
njrat
비응신
b9afd8f299a5bc13aeb1afc43c0ef568
-
reg_key
b9afd8f299a5bc13aeb1afc43c0ef568
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2420 System32.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2268 b9bab88f37b74a18b232fd06e16a59be.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2268 wrote to memory of 2072 2268 b9bab88f37b74a18b232fd06e16a59be.exe 28 PID 2072 wrote to memory of 2420 2072 InstallUtil.exe 29 PID 2072 wrote to memory of 2420 2072 InstallUtil.exe 29 PID 2072 wrote to memory of 2420 2072 InstallUtil.exe 29 PID 2072 wrote to memory of 2420 2072 InstallUtil.exe 29 PID 2072 wrote to memory of 2420 2072 InstallUtil.exe 29 PID 2072 wrote to memory of 2420 2072 InstallUtil.exe 29 PID 2072 wrote to memory of 2420 2072 InstallUtil.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9bab88f37b74a18b232fd06e16a59be.exe"C:\Users\Admin\AppData\Local\Temp\b9bab88f37b74a18b232fd06e16a59be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\System32.exe"C:\Users\Admin\AppData\Local\Temp\System32.exe"3⤵
- Executes dropped EXE
PID:2420
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e