Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2025, 05:30
Behavioral task
behavioral1
Sample
7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe
Resource
win10v2004-20250129-en
General
-
Target
7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe
-
Size
54KB
-
MD5
e55f7e870a7f6012d4f27f9321b7fea0
-
SHA1
8445294700a52ef1ff72cae0b8f56744e436d223
-
SHA256
7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748
-
SHA512
826e584f2e0653a4eb4b5e933fcdd5551fbe93f5d92d2aa0ec519356a77b670dda50deac5cca26df9b0980925515a4b68630dc44defa5ebef1be8b3723da01d3
-
SSDEEP
768:A9XnkRB2EsltqfeQ9beH3S7LJSNExWQG35bmaePD5PvG2XXJdxIEpmyg:A9stGtqGQsHIGWWQcGDFX3xIEpmyg
Malware Config
Signatures
-
Njrat family
-
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation 7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe -
Executes dropped EXE 3 IoCs
pid Process 3228 dllhost.exe 3916 dllhost.exe 3648 dllhost.exe -
pid Process 5020 powershell.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1052 sc.exe 1432 sc.exe 1572 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5020 powershell.exe 5020 powershell.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe 3228 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3228 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 5020 powershell.exe Token: SeDebugPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe Token: 33 3228 dllhost.exe Token: SeIncBasePriorityPrivilege 3228 dllhost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3228 1996 7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe 88 PID 1996 wrote to memory of 3228 1996 7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe 88 PID 1996 wrote to memory of 3228 1996 7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe 88 PID 3228 wrote to memory of 5092 3228 dllhost.exe 89 PID 3228 wrote to memory of 5092 3228 dllhost.exe 89 PID 3228 wrote to memory of 5092 3228 dllhost.exe 89 PID 3228 wrote to memory of 4988 3228 dllhost.exe 91 PID 3228 wrote to memory of 4988 3228 dllhost.exe 91 PID 3228 wrote to memory of 4988 3228 dllhost.exe 91 PID 4988 wrote to memory of 5020 4988 cmd.exe 93 PID 4988 wrote to memory of 5020 4988 cmd.exe 93 PID 4988 wrote to memory of 5020 4988 cmd.exe 93 PID 3228 wrote to memory of 1956 3228 dllhost.exe 94 PID 3228 wrote to memory of 1956 3228 dllhost.exe 94 PID 3228 wrote to memory of 1956 3228 dllhost.exe 94 PID 1956 wrote to memory of 1052 1956 cmd.exe 96 PID 1956 wrote to memory of 1052 1956 cmd.exe 96 PID 1956 wrote to memory of 1052 1956 cmd.exe 96 PID 3228 wrote to memory of 4860 3228 dllhost.exe 97 PID 3228 wrote to memory of 4860 3228 dllhost.exe 97 PID 3228 wrote to memory of 4860 3228 dllhost.exe 97 PID 4860 wrote to memory of 1432 4860 cmd.exe 99 PID 4860 wrote to memory of 1432 4860 cmd.exe 99 PID 4860 wrote to memory of 1432 4860 cmd.exe 99 PID 3228 wrote to memory of 2936 3228 dllhost.exe 100 PID 3228 wrote to memory of 2936 3228 dllhost.exe 100 PID 3228 wrote to memory of 2936 3228 dllhost.exe 100 PID 2936 wrote to memory of 1572 2936 cmd.exe 102 PID 2936 wrote to memory of 1572 2936 cmd.exe 102 PID 2936 wrote to memory of 1572 2936 cmd.exe 102 PID 3228 wrote to memory of 4596 3228 dllhost.exe 103 PID 3228 wrote to memory of 4596 3228 dllhost.exe 103 PID 3228 wrote to memory of 4596 3228 dllhost.exe 103 PID 3228 wrote to memory of 2760 3228 dllhost.exe 105 PID 3228 wrote to memory of 2760 3228 dllhost.exe 105 PID 3228 wrote to memory of 2760 3228 dllhost.exe 105 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5092 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe"C:\Users\Admin\AppData\Local\Temp\7f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\ProgramData\dllhost.exe"C:\ProgramData\dllhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\ProgramData\dllhost.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5092
-
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc query windefend3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\sc.exesc query windefend4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop windefend3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\sc.exesc stop windefend4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete windefend3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\sc.exesc delete windefend4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f3⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\ProgramData\dllhost.exe3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3916
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3648
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5e55f7e870a7f6012d4f27f9321b7fea0
SHA18445294700a52ef1ff72cae0b8f56744e436d223
SHA2567f31048e078d08ad9fc97316feb1f4731dd13a3b4c70722730aa87118037e748
SHA512826e584f2e0653a4eb4b5e933fcdd5551fbe93f5d92d2aa0ec519356a77b670dda50deac5cca26df9b0980925515a4b68630dc44defa5ebef1be8b3723da01d3
-
Filesize
319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82