Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2025, 08:31
Behavioral task
behavioral1
Sample
ef12eb5be4046a8d70e864d3b623bb2d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef12eb5be4046a8d70e864d3b623bb2d.exe
Resource
win10v2004-20241007-en
General
-
Target
ef12eb5be4046a8d70e864d3b623bb2d.exe
-
Size
6.6MB
-
MD5
ef12eb5be4046a8d70e864d3b623bb2d
-
SHA1
cf28f12a882cd8dfa1b280c2254013a7908d1984
-
SHA256
e5cf853398bcdd00fa6925a007cb7683e61d35c11ec641da44c419fd66d66dab
-
SHA512
89c7b5eb7170c58d80b893cbe4e65556f6b8a640321fe390c8c3acd13e2ae786ea9462a6b1db8342fbc107e1575a7dd84051f2aefd6baf94be360bf818d68d4d
-
SSDEEP
196608:fGiGxbAQ5owejuJDUX47dwdW0LBTYPERR:+xCaUX47d4xZ
Malware Config
Extracted
njrat
im523
-
5.tcp.eu.ngrok.io:15938
76f76913a3057d2193e27e6377b7ae49
-
reg_key
76f76913a3057d2193e27e6377b7ae49
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2200 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation INST.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\76f76913a3057d2193e27e6377b7ae49.exe Discord.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\76f76913a3057d2193e27e6377b7ae49.exe Discord.exe -
Executes dropped EXE 2 IoCs
pid Process 1500 INST.exe 1496 Discord.exe -
Loads dropped DLL 2 IoCs
pid Process 2120 ef12eb5be4046a8d70e864d3b623bb2d.exe 2120 ef12eb5be4046a8d70e864d3b623bb2d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\76f76913a3057d2193e27e6377b7ae49 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Discord.exe\" .." Discord.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\76f76913a3057d2193e27e6377b7ae49 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Discord.exe\" .." Discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 87 5.tcp.eu.ngrok.io 22 5.tcp.eu.ngrok.io 54 5.tcp.eu.ngrok.io 69 5.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe Token: 33 1496 Discord.exe Token: SeIncBasePriorityPrivilege 1496 Discord.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2120 2832 ef12eb5be4046a8d70e864d3b623bb2d.exe 83 PID 2832 wrote to memory of 2120 2832 ef12eb5be4046a8d70e864d3b623bb2d.exe 83 PID 2120 wrote to memory of 3684 2120 ef12eb5be4046a8d70e864d3b623bb2d.exe 84 PID 2120 wrote to memory of 3684 2120 ef12eb5be4046a8d70e864d3b623bb2d.exe 84 PID 2120 wrote to memory of 4284 2120 ef12eb5be4046a8d70e864d3b623bb2d.exe 85 PID 2120 wrote to memory of 4284 2120 ef12eb5be4046a8d70e864d3b623bb2d.exe 85 PID 4284 wrote to memory of 1500 4284 cmd.exe 86 PID 4284 wrote to memory of 1500 4284 cmd.exe 86 PID 4284 wrote to memory of 1500 4284 cmd.exe 86 PID 1500 wrote to memory of 1496 1500 INST.exe 90 PID 1500 wrote to memory of 1496 1500 INST.exe 90 PID 1500 wrote to memory of 1496 1500 INST.exe 90 PID 1496 wrote to memory of 2200 1496 Discord.exe 95 PID 1496 wrote to memory of 2200 1496 Discord.exe 95 PID 1496 wrote to memory of 2200 1496 Discord.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef12eb5be4046a8d70e864d3b623bb2d.exe"C:\Users\Admin\AppData\Local\Temp\ef12eb5be4046a8d70e864d3b623bb2d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\ef12eb5be4046a8d70e864d3b623bb2d.exe"C:\Users\Admin\AppData\Local\Temp\ef12eb5be4046a8d70e864d3b623bb2d.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SYSTEM32\cmd.execmd /c echo %temp%3⤵PID:3684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\INST.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\INST.exeC:\Users\Admin\AppData\Local\Temp\INST.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Discord.exe" "Discord.exe" ENABLE6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2200
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5e15f1ae07241a0e093f2fc79dc218011
SHA178ca680266cdc6ebdf880be1a495ec551921320f
SHA256f88d09ebfce239bf3bcc4aaf30da363d3ae1fe938a7877af241884f63385c3aa
SHA512f6ca9c285ac1071e721478fa21a1ec128117bad47b6e7daa3703223de2b582391c42ba83b8ed2a906470307eda70f6657055f6d153dacebfc89df5bc47604cdb
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
1.7MB
MD5948430bbba768d83a37fc725d7d31fbb
SHA1e00d912fe85156f61fd8cd109d840d2d69b9629b
SHA25665ebc074b147d65841a467a49f30a5f2f54659a0cc5dc31411467263a37c02df
SHA512aad73403964228ed690ce3c5383e672b76690f776d4ff38792544c67e6d7b54eb56dd6653f4a89f7954752dae78ca35f738e000ffff07fdfb8ef2af708643186
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4