Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2025, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
Resource
win10v2004-20250129-en
General
-
Target
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
-
Size
237KB
-
MD5
ad1227c52b7d062fa428778f60188be4
-
SHA1
ffa2bbbbab19fb7a28ccbfc8e96b0c94c85b0df8
-
SHA256
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9
-
SHA512
d2d8188f451d645d0283e8938e5063f1e5ff22c6af550f003382ae33f63513062fafb4622a60e98f9fd1bdc00a484024888846e71392447bf4c2811e2a7079bb
-
SSDEEP
3072:F/ItRZp06PJHbIxs+VGSYzlg+lAMSpBV4W/E+z1IQwqznHpYQ5czMWDBoWkb7RKI:zs+V7s6+l+yWD+QwqzHqQk27PJES
Malware Config
Extracted
njrat
0.6.4
HacKed
payment-rivers.gl.at.ply.gg:15267
392725c4d836f07a62148783f8b913f2
-
reg_key
392725c4d836f07a62148783f8b913f2
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2028 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe -
Executes dropped EXE 1 IoCs
pid Process 3184 Microsoft Host.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe File opened for modification C:\Windows\assembly\Desktop.ini 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe File created C:\Windows\assembly\Desktop.ini 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe File opened for modification C:\Windows\assembly\Desktop.ini 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe 3184 Microsoft Host.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3184 Microsoft Host.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3184 4816 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe 86 PID 4816 wrote to memory of 3184 4816 23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe 86 PID 3184 wrote to memory of 2028 3184 Microsoft Host.exe 87 PID 3184 wrote to memory of 2028 3184 Microsoft Host.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe"C:\Users\Admin\AppData\Local\Temp\23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Host.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Host.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Microsoft Host.exe" "Microsoft Host.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5ad1227c52b7d062fa428778f60188be4
SHA1ffa2bbbbab19fb7a28ccbfc8e96b0c94c85b0df8
SHA25623d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9
SHA512d2d8188f451d645d0283e8938e5063f1e5ff22c6af550f003382ae33f63513062fafb4622a60e98f9fd1bdc00a484024888846e71392447bf4c2811e2a7079bb