Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
21/07/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
NjRat 0.7D Green Edition by im523.exe
Resource
win10-20240611-en
General
-
Target
NjRat 0.7D Green Edition by im523.exe
-
Size
2.5MB
-
MD5
db03ed78b35220d0a178d0c4cba27e76
-
SHA1
ba576c67c78c680e2f8c5375d294b5dbd7c3250e
-
SHA256
42b9c295089c7cf9141f5d0a40a1155cfd3627888579473f8c9b80e8e3ea1c48
-
SHA512
c272cfef5199450c903443ae3259191d1ecfd8795854e297aef36c819af8887233419b98bb54e5e5894846a1454c398991487547191c66de00881c31e6d1ae93
-
SSDEEP
49152:LJNiJe3T1/rgMVwPpIGGHgoQhLL2RWNbftLLQPFfO5SSOp:LJNReMVmILHg3gMQSjO
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/4228-16-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-17-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-20-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/4228-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1716 ffhzguglhicn.exe -
resource yara_rule behavioral1/memory/4228-12-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-13-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-11-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-24-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/4228-25-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1716 set thread context of 2040 1716 ffhzguglhicn.exe 79 PID 1716 set thread context of 4228 1716 ffhzguglhicn.exe 80 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3168 sc.exe 4820 sc.exe 4812 sc.exe 4984 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 NjRat 0.7D Green Edition by im523.exe 4988 NjRat 0.7D Green Edition by im523.exe 4988 NjRat 0.7D Green Edition by im523.exe 4988 NjRat 0.7D Green Edition by im523.exe 1716 ffhzguglhicn.exe 1716 ffhzguglhicn.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 4228 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 2040 1716 ffhzguglhicn.exe 79 PID 1716 wrote to memory of 4228 1716 ffhzguglhicn.exe 80 PID 1716 wrote to memory of 4228 1716 ffhzguglhicn.exe 80 PID 1716 wrote to memory of 4228 1716 ffhzguglhicn.exe 80 PID 1716 wrote to memory of 4228 1716 ffhzguglhicn.exe 80 PID 1716 wrote to memory of 4228 1716 ffhzguglhicn.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WAPQYYAB"2⤵
- Launches sc.exe
PID:3168
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WAPQYYAB" binpath= "C:\ProgramData\evhjkmhsccca\ffhzguglhicn.exe" start= "auto"2⤵
- Launches sc.exe
PID:4820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:4984
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WAPQYYAB"2⤵
- Launches sc.exe
PID:4812
-
-
C:\ProgramData\evhjkmhsccca\ffhzguglhicn.exeC:\ProgramData\evhjkmhsccca\ffhzguglhicn.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2040
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5db03ed78b35220d0a178d0c4cba27e76
SHA1ba576c67c78c680e2f8c5375d294b5dbd7c3250e
SHA25642b9c295089c7cf9141f5d0a40a1155cfd3627888579473f8c9b80e8e3ea1c48
SHA512c272cfef5199450c903443ae3259191d1ecfd8795854e297aef36c819af8887233419b98bb54e5e5894846a1454c398991487547191c66de00881c31e6d1ae93