Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/01/2025, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
New Project 1.exe
Resource
win11-20241007-en
General
-
Target
New Project 1.exe
-
Size
25.8MB
-
MD5
62790fdc3f6c5f9f39ff7ebda6f39dbc
-
SHA1
83c77e11d19a2a9112aa6e0949b1fce818626116
-
SHA256
413a21a22075b24b4d3874c42b7d558ab874b9155b4f9a2ae164737fb0d4c0ff
-
SHA512
842930b471b88be82fe535666517e4b39b73e12f7fc0bead3abfe6a791fdcf2e45f5766b7af8c2341e41f9413314bd3d72d79af67c894e5d52d72abb28f3804d
-
SSDEEP
393216:i05l6ltjvQ9zsDsxDWXHuiqYZH1nhrpSW0i3RhKNku8E+:+lt7QxxDW+jYvhWy678E
Malware Config
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2304 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6cc20d2bcae57cc4c762ca69bf946df4.exe Windows Session Manager.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6cc20d2bcae57cc4c762ca69bf946df4.exe Windows Session Manager.exe -
Executes dropped EXE 4 IoCs
pid Process 3828 SilentPatcher.exe 3952 Launcher.exe 1224 Lammer.exe 3436 Windows Session Manager.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6cc20d2bcae57cc4c762ca69bf946df4 = "\"C:\\ProgramData\\Windows Session Manager.exe\" .." Windows Session Manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\6cc20d2bcae57cc4c762ca69bf946df4 = "\"C:\\ProgramData\\Windows Session Manager.exe\" .." Windows Session Manager.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Project 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lammer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Session Manager.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Project 1.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe Token: 33 3436 Windows Session Manager.exe Token: SeIncBasePriorityPrivilege 3436 Windows Session Manager.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1252 wrote to memory of 3828 1252 New Project 1.exe 77 PID 1252 wrote to memory of 3828 1252 New Project 1.exe 77 PID 3828 wrote to memory of 716 3828 SilentPatcher.exe 80 PID 3828 wrote to memory of 716 3828 SilentPatcher.exe 80 PID 1252 wrote to memory of 3952 1252 New Project 1.exe 79 PID 1252 wrote to memory of 3952 1252 New Project 1.exe 79 PID 1252 wrote to memory of 3952 1252 New Project 1.exe 79 PID 1252 wrote to memory of 1224 1252 New Project 1.exe 81 PID 1252 wrote to memory of 1224 1252 New Project 1.exe 81 PID 1252 wrote to memory of 1224 1252 New Project 1.exe 81 PID 1224 wrote to memory of 3436 1224 Lammer.exe 82 PID 1224 wrote to memory of 3436 1224 Lammer.exe 82 PID 1224 wrote to memory of 3436 1224 Lammer.exe 82 PID 3436 wrote to memory of 2304 3436 Windows Session Manager.exe 83 PID 3436 wrote to memory of 2304 3436 Windows Session Manager.exe 83 PID 3436 wrote to memory of 2304 3436 Windows Session Manager.exe 83 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 716 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps13⤵
- Views/modifies file attributes
PID:716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\Lammer.exe"C:\Users\Admin\AppData\Local\Temp\Lammer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\ProgramData\Windows Session Manager.exe"C:\ProgramData\Windows Session Manager.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\Windows Session Manager.exe" "Windows Session Manager.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2304
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5b9f38f2155893e8bf7dc7bc228071ad9
SHA1bc0e543367083e74259e8c0dcbf44b69b9796509
SHA256a04ccff48b9983e37e657d467a413f883021e32beb03baaa9c43516f0e6b6d05
SHA512e89df5d50ab4d1a22dce7308efec88da2f6b5e85ae9aeab788cdbca23158cc042a011fa9e51ba5322796abbd19b9d545f4671f482a5e38e19be2a865219143eb
-
Filesize
14.6MB
MD5df0950532119769bcd0aced1faaabbc7
SHA10ac1d43bcadc03b871234649338707981083a376
SHA2561825d2387cd90678f54ad6a50a484f3b6854c99e2909e2ef3efa73b2f521821b
SHA51243cf4f51c3c94bf4c323f82d949b1bb1ce8f6271696177b191799be6b0e44b7e9f77991578c842a2c7c938a707bbe99de09db29b54e2488eb1bc22b007e33dba
-
Filesize
2.6MB
MD57145358dc4b4908c33481df669f6a0f4
SHA187f13e788bd0bc105f1a9e992166ac819488d9c5
SHA256d1035e2bc6fe5b8450d60f6c45c4d9479a014cec0f15cfd00a23a65a5e10634a
SHA512164c6506b0df97877e15f1b2a668f06521b510817575d9c6df716bdf51e6deac20e2c78eb4ca1f42f4337aec7b747f7ebbcc5d7821a3ce92ac68aca8bd0c184a
-
Filesize
2KB
MD59758656bbe8589c66bb241b052490c72
SHA1b73da83fb3ae6b86c6365769a04de9845d5c602c
SHA256e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351
SHA512da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34