Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

04/11/2024, 23:08 UTC

241104-242eea1rfn 10

04/11/2024, 05:23 UTC

241104-f27yhstpbs 10

28/09/2024, 10:19 UTC

240928-mcp5qssgma 10

Analysis

  • max time kernel
    112s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2024, 23:08 UTC

General

  • Target

    4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe

  • Size

    22KB

  • MD5

    ee653dcd9ed87ec3319c0f443c8a54df

  • SHA1

    63a45f8da331e303a8ae7e93df190a4443a13b57

  • SHA256

    4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814

  • SHA512

    e9cd28d1f6d4d9ddff7943021e3795489941f419aabd649b378d5d0992316751c5418068983b5d26feb6178c2ace2c12dded94839d1f70c6e59682c26562f5e2

  • SSDEEP

    384:IsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZSZQ:/f65K2Yf1jKRpcnupQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

client

C2

akamaru.ddns.net:1605

Mutex

aa15bd929c7132fe8f63fd4d0ae48d6c

Attributes
  • reg_key

    aa15bd929c7132fe8f63fd4d0ae48d6c

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe
    "C:\Users\Admin\AppData\Local\Temp\4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Minecraft
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Minecraft"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Minecraft

    Filesize

    22KB

    MD5

    ee653dcd9ed87ec3319c0f443c8a54df

    SHA1

    63a45f8da331e303a8ae7e93df190a4443a13b57

    SHA256

    4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814

    SHA512

    e9cd28d1f6d4d9ddff7943021e3795489941f419aabd649b378d5d0992316751c5418068983b5d26feb6178c2ace2c12dded94839d1f70c6e59682c26562f5e2

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    657a6e3102813bedc55728c92785d0ef

    SHA1

    c01c6ef98b1b7b3ede31ebfcdb048960505796d6

    SHA256

    dc5608f256cb4822d50b02188cd67608b4ed46bcc0c20f4983f8a676f4624b8b

    SHA512

    52676e08d6a84d8fde13a81ab9bac94631b2a3718dfa6cb656e489748d47ed91204a44bad50caf79cbc8897630c19973017eb8bc83c88c6a71be7b6809740ec4

  • memory/2600-0-0x0000000074F61000-0x0000000074F62000-memory.dmp

    Filesize

    4KB

  • memory/2600-1-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB

  • memory/2600-2-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB

  • memory/2600-5-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.