Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2025, 14:06 UTC

General

  • Target

    c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe

  • Size

    63KB

  • MD5

    77d4c97adec12a2bc31e14482231036d

  • SHA1

    ec2082e39537ff8633585faf03a510264eb14b69

  • SHA256

    c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669

  • SHA512

    90d15de3d731912c60ba38b390807063b77df75a0a0442f9072b951794b5c4217c8b7601dbf8a905bac9ea53e734015957c2c347cb7f35a9848f73179dbc3ba5

  • SSDEEP

    1536:G3GNisbcrQ3KXyV+LKhpadsNbRPLN8GQhTUVYC3EWz:bN0r3XyamrNdPR8GcYEWz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Mourad

C2

halimoullah.no-ip.org:1234

Mutex

0e38f0c0b1d3bb006f8fbc6faf254716

Attributes
  • reg_key

    0e38f0c0b1d3bb006f8fbc6faf254716

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe
    "C:\Users\Admin\AppData\Local\Temp\c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\chrome.eexe
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\chrome.eexe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    ecfdf0a3e43630a9c96dcf3efebf76c1

    SHA1

    e8070490e7e59aa5e2f0370f386be1f2aa329dc6

    SHA256

    9e5288104cfe7772b04420ec5d481f4ea142ca1172c02f76c84afcddb2a197bd

    SHA512

    2e074c9db494ef51f705433f33115b9512830581279010d571915397f44e2e025431223d4357472bff70fbe8d16aa69533a4ca601c4336d57bfe277102d3779a

  • C:\Users\Admin\AppData\Roaming\chrome.eexe

    Filesize

    63KB

    MD5

    77d4c97adec12a2bc31e14482231036d

    SHA1

    ec2082e39537ff8633585faf03a510264eb14b69

    SHA256

    c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669

    SHA512

    90d15de3d731912c60ba38b390807063b77df75a0a0442f9072b951794b5c4217c8b7601dbf8a905bac9ea53e734015957c2c347cb7f35a9848f73179dbc3ba5

  • memory/2592-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/2592-1-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2592-2-0x0000000000470000-0x000000000047A000-memory.dmp

    Filesize

    40KB

  • memory/2592-3-0x00000000007B0000-0x00000000007CC000-memory.dmp

    Filesize

    112KB

  • memory/2592-4-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/2592-6-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.