Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2025, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe
Resource
win7-20240903-en
General
-
Target
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe
-
Size
64KB
-
MD5
25e50be90bfd526318a41296bfb5b650
-
SHA1
9a57776f4110fda99adb8e7e86797d6caf96dc7f
-
SHA256
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92
-
SHA512
c187fb49605ba2c9c4a6ca2c68dc6c263ae26552a2fdf00bc6cd508f01abc8526741171ea6c80aca2c9ed5665c734a7cb21d210e5429801e71773ed20701682e
-
SSDEEP
1536:3EFRfIIajeMzBdiGN9BbwNLi2bhtbxnCAumX:4RfIIYnbONVv5CAFX
Malware Config
Extracted
njrat
0.6.4
HacKed
127.0.0.1:1177
41180d06ba79ca0eb6f0d961bf964eef
-
reg_key
41180d06ba79ca0eb6f0d961bf964eef
-
splitter
|'|'|
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe -
Executes dropped EXE 2 IoCs
pid Process 4920 stick surf.exe 1844 stick surf.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4128 set thread context of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4920 set thread context of 1844 4920 stick surf.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4388 1844 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stick surf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe Token: SeDebugPrivilege 4920 stick surf.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 4128 wrote to memory of 3144 4128 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 86 PID 3144 wrote to memory of 4920 3144 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 87 PID 3144 wrote to memory of 4920 3144 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 87 PID 3144 wrote to memory of 4920 3144 071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe 87 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88 PID 4920 wrote to memory of 1844 4920 stick surf.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe"C:\Users\Admin\AppData\Local\Temp\071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exeC:\Users\Admin\AppData\Local\Temp\071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\stick surf.exe"C:\Users\Admin\AppData\Local\Temp\stick surf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\stick surf.exe"C:\Users\Admin\AppData\Local\Temp\stick surf.exe"4⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 805⤵
- Program crash
PID:4388
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1844 -ip 18441⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe.log
Filesize496B
MD5759390dcc1aaa2fbaf157db7a617f27d
SHA17788e0f06fc80204b8205366febb932c8a1daafc
SHA256d453de6558a2194099725ba01e88ba516979f059f260d99d2ec9969d668a509f
SHA512e95894be0ab38096a7b82480ee16b7802b5ec64ccca9b105384d46583d0e5284e90229ced4b33fd76870c4a97e425494a65a37bc7f7cebc8928d41c93e2573c2
-
Filesize
64KB
MD525e50be90bfd526318a41296bfb5b650
SHA19a57776f4110fda99adb8e7e86797d6caf96dc7f
SHA256071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92
SHA512c187fb49605ba2c9c4a6ca2c68dc6c263ae26552a2fdf00bc6cd508f01abc8526741171ea6c80aca2c9ed5665c734a7cb21d210e5429801e71773ed20701682e