Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe
Resource
win7-20240903-en
General
-
Target
febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe
-
Size
240KB
-
MD5
6df5520cdae8ba7dbc37ad82e7a9295f
-
SHA1
a8814cf76350dc1ecf79bc47fb9ca366695be621
-
SHA256
febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49
-
SHA512
749e4dc974b56eeaefd81f585dc26492404c836a804eebd368d2cd226688001fa26fb198e9da4fbf5db34014952c3561e373aef2001a60c0d6bb545e8112a84f
-
SSDEEP
6144:3+x9BQjb3N0X9I2MeYwxzy8yfEn2/seQA:Oi3c9tMSyncneZ
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
127.0.0.1:4444
d099d73cec5e8c22e0945821b611e5d5
-
reg_key
d099d73cec5e8c22e0945821b611e5d5
-
splitter
Y262SUCZ4UJJ
Signatures
-
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 2312 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2744 febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe Token: SeDebugPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe Token: 33 2312 winlogon.exe Token: SeIncBasePriorityPrivilege 2312 winlogon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe"C:\Users\Admin\AppData\Local\Temp\febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD56df5520cdae8ba7dbc37ad82e7a9295f
SHA1a8814cf76350dc1ecf79bc47fb9ca366695be621
SHA256febb8bb939db969aebc42c70ed6e96dff895b116fd049b6c4f85f9a90ad1bc49
SHA512749e4dc974b56eeaefd81f585dc26492404c836a804eebd368d2cd226688001fa26fb198e9da4fbf5db34014952c3561e373aef2001a60c0d6bb545e8112a84f