Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 13:25

General

  • Target

    b08b34c4124dbe78ea4c620dc5fc37e0N.exe

  • Size

    117KB

  • MD5

    b08b34c4124dbe78ea4c620dc5fc37e0

  • SHA1

    9ec51c29687660005842845b6151ff6d7faf2f9e

  • SHA256

    e16fc240955e3a55f8ecf1ffe52fb0d40a6b6189d44aaeaeaf0de56c2c9cccaa

  • SHA512

    3c0a1db92c88465f20a9f0a82fddd74f8b46c64244852b10c50d3bef5caf49b1ea564aca71c441412ec020d6449c6a2a7af98b21853fb15fa3079746271fb8ea

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZlg:P5eznsjsguGDFqGZ2rDLw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b08b34c4124dbe78ea4c620dc5fc37e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b08b34c4124dbe78ea4c620dc5fc37e0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
      "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE

    Filesize

    1KB

    MD5

    e7122c733f9e37bba0ca4c985ce11d6d

    SHA1

    d661aa5b31ff7ef2df9bc4095279058c36499af2

    SHA256

    acc9932453f5aa68f4b95986668f5584f99e55bbe02eefc0d0960dab376df81a

    SHA512

    84cddf68a46f455b4ebbb8c0c70607fe60796cfc5eabdace12d0684a1323af9681700acbdbdc37e63d7806d0220fce9cba5213bb35cee056f9d71646f98711b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE

    Filesize

    264B

    MD5

    71f3e53d5952a95588748885879492fb

    SHA1

    849cd9db3929bc745ee20fe36a897b8cc6e240bb

    SHA256

    e7ef8b92c9bcf1ed075ece967752b4ad75f633c20133833f8d18c9fd48d1b24f

    SHA512

    3aed4bed05312588a4a2ac1796287032a1fecb113b33f7c3ae0e605eccd3fb2095fb5703521c4556cca1f75073cd3d2fb62050105f3688ac461e22fa93b796f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50ba130d548f201b139953a9e1a018c2

    SHA1

    165b27183e1720bbfbf6a6599c05e8a328384095

    SHA256

    178e74fe1afcdc00f42013dfd5cf01ccd11e62b5f27ae600ff93e4323ad9943f

    SHA512

    b498a5dbc0d918a8bc2593fc7be8dbb94794c2e0eb663fb94fe15e83542b1dde55578afc3145f2380386804e2c3dbe509f0a621b16611bb8ca0987a2ae0a70d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13eb4a2a6d7e9393cbc47bd32f5b1fa4

    SHA1

    fb40dc9dae852a77117ba7d7478ccb484199e973

    SHA256

    9bf117fc39df2ad052a0c77c1d8bf3abbb8a4a2a6a7e101b7b9ccd9dddca4c76

    SHA512

    0332ada02cf22f99dd42bbf019af58c8998d5e320594c9698b92c6a4abbb120e8b6fae9919ec096e444c58ef423ef7f3d33867c28a98be8dad63052fb0d85eba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3107f2217abf8bce8a2f688f6b0a9c9a

    SHA1

    8191837802bfb36d65bf308f68cda97c3e8724ea

    SHA256

    46e257504c0d39aa3c725b238dcbb4ff4cbb1a7aee0a07ac7e9fea0165f24505

    SHA512

    ec5f37199fb534eb63b87edc45229a8b700e637a7f7ec47925249c6adc3cc2e2dbac447c821a1dc18ad0dff7fd0e9fa24f66fb31d94b3a0f70b24d80f74391b1

  • C:\Users\Admin\AppData\Local\Temp\Cab205E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2061.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

    Filesize

    117KB

    MD5

    89ace82bef742254f7a9a998b1c05a5f

    SHA1

    b18b70084e08150cfc541728e8f4c071e7b12197

    SHA256

    f2b66f1247059bf004abdb6af032b6f4f08b34d1818a4c684f864ffae9369d70

    SHA512

    5dab0b279593930ed1dedff751881b5bd0b4f6e4cb856ba3221b3e8c8808548daaa7091656b3b170d2ccbd474af394778cb15bf7d76993dc322b30062eaeec1c

  • memory/2704-345-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2704-347-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2704-348-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3008-179-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/3008-0-0x0000000074CC1000-0x0000000074CC2000-memory.dmp

    Filesize

    4KB

  • memory/3008-1-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB