Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 00:02 UTC

General

  • Target

    456c297ee58a7d337360836ce73ac700N.exe

  • Size

    184KB

  • MD5

    456c297ee58a7d337360836ce73ac700

  • SHA1

    87ee25a235e382dfa8b82cad086feb46575faeae

  • SHA256

    e344064b9c7a3863c15f39a7c34ce583f0e0f822acce5483cc5d82475230ee7a

  • SHA512

    15219d42d4fc01fb24cd84be725752d67a0da3183193ca7a52205202d5203bfe133345afe6b44f3a873f0f5b181e2b6616fb71bdcbb6a5675e32f90059fb776c

  • SSDEEP

    3072:dBV4RZJjae2uEvCGh3w8XBiGr13Xaiao1v4xyML8J86X/:dH4vJjt2uEKGpw8XvIq1Ej6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

31.215.173.15:5552

Mutex

84774431e5310e236d661db9ce8f427a

Attributes
  • reg_key

    84774431e5310e236d661db9ce8f427a

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\456c297ee58a7d337360836ce73ac700N.exe
    "C:\Users\Admin\AppData\Local\Temp\456c297ee58a7d337360836ce73ac700N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\system32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:2188

Network

    No results found
  • 31.215.173.15:5552
    server.exe
    152 B
    3
  • 31.215.173.15:5552
    server.exe
    152 B
    3
  • 31.215.173.15:5552
    server.exe
    152 B
    3
  • 31.215.173.15:5552
    server.exe
    152 B
    3
  • 31.215.173.15:5552
    server.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    184KB

    MD5

    456c297ee58a7d337360836ce73ac700

    SHA1

    87ee25a235e382dfa8b82cad086feb46575faeae

    SHA256

    e344064b9c7a3863c15f39a7c34ce583f0e0f822acce5483cc5d82475230ee7a

    SHA512

    15219d42d4fc01fb24cd84be725752d67a0da3183193ca7a52205202d5203bfe133345afe6b44f3a873f0f5b181e2b6616fb71bdcbb6a5675e32f90059fb776c

  • memory/1724-0-0x000007FEF601E000-0x000007FEF601F000-memory.dmp

    Filesize

    4KB

  • memory/1724-1-0x00000000002F0000-0x00000000002FC000-memory.dmp

    Filesize

    48KB

  • memory/1724-2-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1724-3-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1724-12-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2528-9-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2528-10-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2528-11-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2528-14-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2528-15-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.