Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/02/2025, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe
Resource
win10v2004-20241007-en
General
-
Target
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe
-
Size
1.4MB
-
MD5
fab832128cfee7b34fb7600408e27dc3
-
SHA1
b22e992d765113ee427a254f98d68cf28f37ead4
-
SHA256
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff
-
SHA512
74ddc16c9016bfdc0c3f824941b667f630a22a62e4ab0ab1454f519d90150b2cba9c1d9c36c99e3a9692018322859b1ec8d8749d9c6cbbd792bc0faceb52ff8f
-
SSDEEP
24576:Gu6J33O0c+JY5UZ+XC0kGso6FabA1M+OO5SJ46cQMpdhEWYX:Iu0c++OCvkGs9FabA1rOOsi6cQ8YX
Malware Config
Extracted
njrat
0.7d
NDDY
88.208.246.143:5201
baeb5144863fb199998c3361c106958f
-
reg_key
baeb5144863fb199998c3361c106958f
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2388 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1840 notepad.exe 1968 notepad.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000015cc0-16.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1588 set thread context of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1840 set thread context of 2208 1840 notepad.exe 38 PID 1968 set thread context of 484 1968 notepad.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1188 schtasks.exe 2752 schtasks.exe 2332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 1840 notepad.exe 1840 notepad.exe 1968 notepad.exe 1968 notepad.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe Token: 33 1284 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1284 RegSvcs.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1588 wrote to memory of 1284 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 30 PID 1284 wrote to memory of 2388 1284 RegSvcs.exe 31 PID 1284 wrote to memory of 2388 1284 RegSvcs.exe 31 PID 1284 wrote to memory of 2388 1284 RegSvcs.exe 31 PID 1284 wrote to memory of 2388 1284 RegSvcs.exe 31 PID 1588 wrote to memory of 2752 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 33 PID 1588 wrote to memory of 2752 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 33 PID 1588 wrote to memory of 2752 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 33 PID 1588 wrote to memory of 2752 1588 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 33 PID 1684 wrote to memory of 1840 1684 taskeng.exe 37 PID 1684 wrote to memory of 1840 1684 taskeng.exe 37 PID 1684 wrote to memory of 1840 1684 taskeng.exe 37 PID 1684 wrote to memory of 1840 1684 taskeng.exe 37 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2208 1840 notepad.exe 38 PID 1840 wrote to memory of 2332 1840 notepad.exe 39 PID 1840 wrote to memory of 2332 1840 notepad.exe 39 PID 1840 wrote to memory of 2332 1840 notepad.exe 39 PID 1840 wrote to memory of 2332 1840 notepad.exe 39 PID 1684 wrote to memory of 1968 1684 taskeng.exe 41 PID 1684 wrote to memory of 1968 1684 taskeng.exe 41 PID 1684 wrote to memory of 1968 1684 taskeng.exe 41 PID 1684 wrote to memory of 1968 1684 taskeng.exe 41 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 484 1968 notepad.exe 42 PID 1968 wrote to memory of 1188 1968 notepad.exe 43 PID 1968 wrote to memory of 1188 1968 notepad.exe 43 PID 1968 wrote to memory of 1188 1968 notepad.exe 43 PID 1968 wrote to memory of 1188 1968 notepad.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe"C:\Users\Admin\AppData\Local\Temp\b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" "RegSvcs.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2388
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn curl /tr "C:\Users\Admin\AppXDeploymentServer\notepad.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2752
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {191C26A0-8E82-4C1B-A0B6-86FB2CC5B616} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppXDeploymentServer\notepad.exeC:\Users\Admin\AppXDeploymentServer\notepad.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn curl /tr "C:\Users\Admin\AppXDeploymentServer\notepad.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
-
C:\Users\Admin\AppXDeploymentServer\notepad.exeC:\Users\Admin\AppXDeploymentServer\notepad.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:484
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn curl /tr "C:\Users\Admin\AppXDeploymentServer\notepad.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f896c178af0bbcf694e73df31bff0ec1
SHA14e2dde0365331ddd4434a3a0e9a1416f0529f6c8
SHA2567254afdf550c0378369d306e6716a80f252eb769113ff4906eac954d8eaacaa6
SHA51281dc8b7dafe476483f655ee98346e293f894bc330ab237e850b80809f4e8d474020ed06cdefbf2be49db885bb5964057e890bd948b300e954cdbbc75c5b61cd7