Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/12/2024, 03:50 UTC

General

  • Target

    780f58ee78d7c94199192ef030bb63c5bb4516e27487c27cdcc7c75aa1cf9e67N.exe

  • Size

    1.2MB

  • MD5

    d79687d0ecfda782cb48b6cd26c05fa0

  • SHA1

    f98c4a59da3b3cbb4e5f0ff0fceed556b92f2bb6

  • SHA256

    780f58ee78d7c94199192ef030bb63c5bb4516e27487c27cdcc7c75aa1cf9e67

  • SHA512

    ef68393f59f45dac25f9b4e0d59350adb8f5e29d206289fc39a73b750c7825e94f9aa0b6b7839cf5234e295d091ded70f91c7427dacea3d3637701e126bf6400

  • SSDEEP

    24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaW7aWvCaFg5a7PCmWX95L:Jh+ZkldoPK8YaW7CaZ7IHL

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

redlanhopto

C2

redlan.hopto.org:5553

Mutex

d25d360449d7bab3069e1b77b3a914a3

Attributes
  • reg_key

    d25d360449d7bab3069e1b77b3a914a3

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\780f58ee78d7c94199192ef030bb63c5bb4516e27487c27cdcc7c75aa1cf9e67N.exe
    "C:\Users\Admin\AppData\Local\Temp\780f58ee78d7c94199192ef030bb63c5bb4516e27487c27cdcc7c75aa1cf9e67N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2792
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /create /tn igfxHK /tr "C:\Users\Admin\AppData\Roaming\chkdsk\data.exe" /sc minute /mo 1 /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2188
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {FBD8FB0D-0849-4E29-B97E-E9784410C992} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Roaming\chkdsk\data.exe
      C:\Users\Admin\AppData\Roaming\chkdsk\data.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2548

Network

  • flag-us
    DNS
    redlan.hopto.org
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    redlan.hopto.org
    IN A
    Response
    redlan.hopto.org
    IN A
    184.105.237.195
  • 184.105.237.195:5553
    redlan.hopto.org
    RegAsm.exe
    637 B
    248 B
    7
    6
  • 184.105.237.195:5553
    redlan.hopto.org
    RegAsm.exe
    637 B
    248 B
    7
    6
  • 184.105.237.195:5553
    redlan.hopto.org
    RegAsm.exe
    637 B
    248 B
    7
    6
  • 184.105.237.195:5553
    redlan.hopto.org
    RegAsm.exe
    545 B
    168 B
    5
    4
  • 8.8.8.8:53
    redlan.hopto.org
    dns
    RegAsm.exe
    62 B
    78 B
    1
    1

    DNS Request

    redlan.hopto.org

    DNS Response

    184.105.237.195

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\chkdsk\data.exe

    Filesize

    1.2MB

    MD5

    8f766d4c848f607b49d51aeb7fbd65cd

    SHA1

    27596519a47f3a2f7410f3221c6e18e31047cda8

    SHA256

    c244a32019ac2e90cfc90ea66eeaeb0f3f60cbecad5198c4b51b1594b87f16d9

    SHA512

    3bac8605a3ef28b2c66338c6615132ede90e238b02357d7d97edc4e54884330c3070b793593ed534fe27e6074c40ed34a44e7f2fc9de2913145853b5c303b1db

  • memory/1352-0-0x00000000000B0000-0x00000000000B1000-memory.dmp

    Filesize

    4KB

  • memory/2548-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2800-2-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2800-9-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2800-8-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2800-6-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2800-1-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2800-10-0x0000000074492000-0x0000000074494000-memory.dmp

    Filesize

    8KB

  • memory/2800-11-0x0000000074492000-0x0000000074494000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.