Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2024, 23:47

General

  • Target

    d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe

  • Size

    172KB

  • MD5

    615e7480ad72e1972fc90fbb1fa23bb0

  • SHA1

    aec002a1465c11efcf492273bee97a22c8b6fa77

  • SHA256

    d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d

  • SHA512

    8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19

  • SSDEEP

    3072:UVqoCl/YgjxEufVU0TbTyDDalRFvh4Bge+yJYL:UsLqdufVUNDaBh4GH

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

learn-rage.gl.at.ply.gg:27556

Mutex

e456603c650484e45e47269f670d15a9

Attributes
  • reg_key

    e456603c650484e45e47269f670d15a9

  • splitter

    |'|'|

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
    "C:\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2304
    • \??\c:\users\admin\appdata\local\temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 
      c:\users\admin\appdata\local\temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2964
        • \??\c:\users\admin\appdata\local\temp\server.exe 
          c:\users\admin\appdata\local\temp\server.exe 
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2824
        • C:\Windows\Resources\Themes\icsys.icn.exe
          C:\Windows\Resources\Themes\icsys.icn.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:528
          • \??\c:\windows\resources\themes\explorer.exe
            c:\windows\resources\themes\explorer.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2940
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2172
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2732
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2860
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2856
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2600
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:49 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2196
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:50 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2292
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:3056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      faf85526071fc3b6f73b59d81e3211c8

      SHA1

      ede2a1dc18bf2d7c77d9c49978c5ee0f77820cb7

      SHA256

      a8a3e229cf8c556b81ac0f9c6b4afe42bce0e82ea43dfdc7feafeef5ec771e06

      SHA512

      ad1ab964d510f1fdfe6af091f4e94e25d03db01c4c1904f83dcb16d290a5949df4738c93d6b16f723f09573f88608b7efa9f63945357343db3516dff4c4d5d45

    • \Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 

      Filesize

      37KB

      MD5

      266dab6809fcc7a59f79a36edfff6682

      SHA1

      ab0b69adea1fffa3f35705db40c9b4531624ea84

      SHA256

      72f1513b6c29378f8e7cb14a727ccdea12f1581ebcb84a2a5dd7da8a2b70cc6d

      SHA512

      4a8b8904023deb4b31f42bf50cb9d3e5018158a52fde270dac933f6978153b9c9bf801093d7aec22e654c7ff50e57f970db9b14ffbf4e3e61df5858ad2830f15

    • \Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      172KB

      MD5

      615e7480ad72e1972fc90fbb1fa23bb0

      SHA1

      aec002a1465c11efcf492273bee97a22c8b6fa77

      SHA256

      d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d

      SHA512

      8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19

    • \Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      9fcb365b27da55232f5db607c1a5684d

      SHA1

      906d0e0648cccc8aebbe79442e53fcab995442d6

      SHA256

      7dce4cb6b2200d874a50723ab3fe2f318f8628103eed95b3cfaa7727a89c3994

      SHA512

      ea219830897ca8b2d3dc39d90eefe4ced03f976ff128516878723ea505009b577c2e9a8169c050f440c97b54c750616acc14615740ca0f347d69a400fcf49dab

    • \Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      132c42fce8ec18f91789fa93b79682a0

      SHA1

      5ef4b5ea2ce5110a8feb61516e3790df8b0984ff

      SHA256

      54f80fdcad386ec9c6acf068ff4524beae804d6648a0ceb5d54934fedb8712a3

      SHA512

      d01813b9db8ce17f24aacef8aa695b16c9cbb3cae60fe342b9f61b52a1d8afb154a46793ee9d8fd3ec9c031b8d2323e6833825b0bcf3ed2b16a23d15e942c2fb

    • \Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      72c5ff6c9ae2e0379a4085ce464d4e58

      SHA1

      83d2da1beaf2961f7583b1e060db9c0d3bf177aa

      SHA256

      70b8dcc44a4043a4c0fb1e26e50952f4c8aa7c9c540112b0eface66ba81b0a84

      SHA512

      9ce8c7ab03e2b89e61443e0fca102cae932f19eb514d2da1305ea3963ccab0c4f8e39aac228cddfbc7ffbf683b39207213e306879508051b3cad1e740ac430d2

    • memory/528-91-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2064-20-0x0000000004760000-0x000000000477F000-memory.dmp

      Filesize

      124KB

    • memory/2064-11-0x0000000074271000-0x0000000074272000-memory.dmp

      Filesize

      4KB

    • memory/2064-27-0x0000000074270000-0x000000007481B000-memory.dmp

      Filesize

      5.7MB

    • memory/2064-12-0x0000000074270000-0x000000007481B000-memory.dmp

      Filesize

      5.7MB

    • memory/2064-13-0x0000000074270000-0x000000007481B000-memory.dmp

      Filesize

      5.7MB

    • memory/2172-47-0x00000000003E0000-0x00000000003FF000-memory.dmp

      Filesize

      124KB

    • memory/2172-79-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2304-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2304-80-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2304-28-0x00000000003A0000-0x00000000003BF000-memory.dmp

      Filesize

      124KB

    • memory/2600-77-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2732-92-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2856-93-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2856-94-0x0000000000280000-0x000000000029F000-memory.dmp

      Filesize

      124KB

    • memory/2860-78-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2940-89-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2964-90-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB