Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/02/2025, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe
Resource
win7-20240903-en
General
-
Target
febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe
-
Size
240KB
-
MD5
6df5520cdae8ba7dbc37ad82e7a9295f
-
SHA1
a8814cf76350dc1ecf79bc47fb9ca366695be621
-
SHA256
febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49
-
SHA512
749e4dc974b56eeaefd81f585dc26492404c836a804eebd368d2cd226688001fa26fb198e9da4fbf5db34014952c3561e373aef2001a60c0d6bb545e8112a84f
-
SSDEEP
6144:3+x9BQjb3N0X9I2MeYwxzy8yfEn2/seQA:Oi3c9tMSyncneZ
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
127.0.0.1:4444
d099d73cec5e8c22e0945821b611e5d5
-
reg_key
d099d73cec5e8c22e0945821b611e5d5
-
splitter
Y262SUCZ4UJJ
Signatures
-
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 2352 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1736 febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe Token: SeDebugPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe Token: 33 2352 winlogon.exe Token: SeIncBasePriorityPrivilege 2352 winlogon.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2352 2116 taskeng.exe 31 PID 2116 wrote to memory of 2352 2116 taskeng.exe 31 PID 2116 wrote to memory of 2352 2116 taskeng.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe"C:\Users\Admin\AppData\Local\Temp\febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
C:\Windows\system32\taskeng.exetaskeng.exe {D80F98C4-2436-4A3A-BF7B-B9CB84DD9790} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD56df5520cdae8ba7dbc37ad82e7a9295f
SHA1a8814cf76350dc1ecf79bc47fb9ca366695be621
SHA256febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49
SHA512749e4dc974b56eeaefd81f585dc26492404c836a804eebd368d2cd226688001fa26fb198e9da4fbf5db34014952c3561e373aef2001a60c0d6bb545e8112a84f