Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/02/2025, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
Resource
win10v2004-20250129-en
General
-
Target
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
-
Size
237KB
-
MD5
ad1227c52b7d062fa428778f60188be4
-
SHA1
ffa2bbbbab19fb7a28ccbfc8e96b0c94c85b0df8
-
SHA256
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9
-
SHA512
d2d8188f451d645d0283e8938e5063f1e5ff22c6af550f003382ae33f63513062fafb4622a60e98f9fd1bdc00a484024888846e71392447bf4c2811e2a7079bb
-
SSDEEP
3072:F/ItRZp06PJHbIxs+VGSYzlg+lAMSpBV4W/E+z1IQwqznHpYQ5czMWDBoWkb7RKI:zs+V7s6+l+yWD+QwqzHqQk27PJES
Malware Config
Extracted
njrat
0.6.4
HacKed
payment-rivers.gl.at.ply.gg:15267
392725c4d836f07a62148783f8b913f2
-
reg_key
392725c4d836f07a62148783f8b913f2
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 956 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 Microsoft Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe 2136 Microsoft Host.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2136 Microsoft Host.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2136 2504 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe 30 PID 2504 wrote to memory of 2136 2504 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe 30 PID 2504 wrote to memory of 2136 2504 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe 30 PID 2136 wrote to memory of 956 2136 Microsoft Host.exe 31 PID 2136 wrote to memory of 956 2136 Microsoft Host.exe 31 PID 2136 wrote to memory of 956 2136 Microsoft Host.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe"C:\Users\Admin\AppData\Local\Temp\23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Host.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Host.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Microsoft Host.exe" "Microsoft Host.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5ad1227c52b7d062fa428778f60188be4
SHA1ffa2bbbbab19fb7a28ccbfc8e96b0c94c85b0df8
SHA25623d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9
SHA512d2d8188f451d645d0283e8938e5063f1e5ff22c6af550f003382ae33f63513062fafb4622a60e98f9fd1bdc00a484024888846e71392447bf4c2811e2a7079bb