Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 09:47 UTC

General

  • Target

    L1xware.exe

  • Size

    32KB

  • MD5

    b369b171954015e188eb2646dbd4c817

  • SHA1

    41b79bd407b8c6a6edc87c66e6692bf203ce749b

  • SHA256

    6aeada94389e3c6c001857ce2e22139e63a4ece256faf3dcde568adadfdc1bf5

  • SHA512

    0acc701ff7a30dbc665847fd06094737ae863b228459661dfbb0e42fcfc92585c09e391876787ca6fd99002e3c997390f40bcf07d2a87ff7d6bc69416ee03efc

  • SSDEEP

    384:WF5kg0KQUvUpsi+daDpyFva9dFPIQL1fJfiTK2glD4odg9TduS/EIGsJjwE7UMcY:Oo0Ldae8/FmouDuCEIGfRt+f

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\L1xware.exe
    "C:\Users\Admin\AppData\Local\Temp\L1xware.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Users\Admin\AppData\Local\Temp\System32.exe
      "C:\Users\Admin\AppData\Local\Temp\System32.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\System32.exe" "System32.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3948
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4512,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:8
    1⤵
      PID:4400

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      133.211.185.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.211.185.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      22.160.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      22.160.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      56.163.245.4.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      56.163.245.4.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      11.227.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      11.227.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      79.190.18.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      79.190.18.2.in-addr.arpa
      IN PTR
      Response
      79.190.18.2.in-addr.arpa
      IN PTR
      a2-18-190-79deploystaticakamaitechnologiescom
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    • flag-us
      DNS
      l1x.ddns.net
      System32.exe
      Remote address:
      8.8.8.8:53
      Request
      l1x.ddns.net
      IN A
      Response
    No results found
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      133.211.185.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      133.211.185.52.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      22.160.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      22.160.190.20.in-addr.arpa

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      56.163.245.4.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      56.163.245.4.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      11.227.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      11.227.111.52.in-addr.arpa

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      79.190.18.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      79.190.18.2.in-addr.arpa

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    • 8.8.8.8:53
      l1x.ddns.net
      dns
      System32.exe
      58 B
      118 B
      1
      1

      DNS Request

      l1x.ddns.net

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\System32.exe

      Filesize

      32KB

      MD5

      b369b171954015e188eb2646dbd4c817

      SHA1

      41b79bd407b8c6a6edc87c66e6692bf203ce749b

      SHA256

      6aeada94389e3c6c001857ce2e22139e63a4ece256faf3dcde568adadfdc1bf5

      SHA512

      0acc701ff7a30dbc665847fd06094737ae863b228459661dfbb0e42fcfc92585c09e391876787ca6fd99002e3c997390f40bcf07d2a87ff7d6bc69416ee03efc

    • memory/396-13-0x0000000074DB0000-0x0000000075361000-memory.dmp

      Filesize

      5.7MB

    • memory/396-14-0x0000000074DB0000-0x0000000075361000-memory.dmp

      Filesize

      5.7MB

    • memory/396-16-0x0000000074DB0000-0x0000000075361000-memory.dmp

      Filesize

      5.7MB

    • memory/4040-0-0x0000000074DB2000-0x0000000074DB3000-memory.dmp

      Filesize

      4KB

    • memory/4040-1-0x0000000074DB0000-0x0000000075361000-memory.dmp

      Filesize

      5.7MB

    • memory/4040-2-0x0000000074DB0000-0x0000000075361000-memory.dmp

      Filesize

      5.7MB

    • memory/4040-12-0x0000000074DB0000-0x0000000075361000-memory.dmp

      Filesize

      5.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.