Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2025, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe
Resource
win10v2004-20241007-en
General
-
Target
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe
-
Size
1.4MB
-
MD5
fab832128cfee7b34fb7600408e27dc3
-
SHA1
b22e992d765113ee427a254f98d68cf28f37ead4
-
SHA256
b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff
-
SHA512
74ddc16c9016bfdc0c3f824941b667f630a22a62e4ab0ab1454f519d90150b2cba9c1d9c36c99e3a9692018322859b1ec8d8749d9c6cbbd792bc0faceb52ff8f
-
SSDEEP
24576:Gu6J33O0c+JY5UZ+XC0kGso6FabA1M+OO5SJ46cQMpdhEWYX:Iu0c++OCvkGs9FabA1rOOsi6cQ8YX
Malware Config
Extracted
njrat
0.7d
NDDY
88.208.246.143:5201
baeb5144863fb199998c3361c106958f
-
reg_key
baeb5144863fb199998c3361c106958f
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3840 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation notepad.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation notepad.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 notepad.exe 1804 notepad.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b97-16.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4792 set thread context of 1472 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 82 PID 2828 set thread context of 1784 2828 notepad.exe 97 PID 1804 set thread context of 1204 1804 notepad.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3184 schtasks.exe 3912 schtasks.exe 3316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 2828 notepad.exe 2828 notepad.exe 2828 notepad.exe 2828 notepad.exe 1804 notepad.exe 1804 notepad.exe 1804 notepad.exe 1804 notepad.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe Token: 33 1472 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1472 RegSvcs.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1472 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 82 PID 4792 wrote to memory of 1472 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 82 PID 4792 wrote to memory of 1472 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 82 PID 4792 wrote to memory of 1472 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 82 PID 4792 wrote to memory of 1472 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 82 PID 1472 wrote to memory of 3840 1472 RegSvcs.exe 83 PID 1472 wrote to memory of 3840 1472 RegSvcs.exe 83 PID 1472 wrote to memory of 3840 1472 RegSvcs.exe 83 PID 4792 wrote to memory of 3316 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 92 PID 4792 wrote to memory of 3316 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 92 PID 4792 wrote to memory of 3316 4792 b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe 92 PID 2828 wrote to memory of 1784 2828 notepad.exe 97 PID 2828 wrote to memory of 1784 2828 notepad.exe 97 PID 2828 wrote to memory of 1784 2828 notepad.exe 97 PID 2828 wrote to memory of 1784 2828 notepad.exe 97 PID 2828 wrote to memory of 1784 2828 notepad.exe 97 PID 2828 wrote to memory of 3184 2828 notepad.exe 98 PID 2828 wrote to memory of 3184 2828 notepad.exe 98 PID 2828 wrote to memory of 3184 2828 notepad.exe 98 PID 1804 wrote to memory of 1204 1804 notepad.exe 101 PID 1804 wrote to memory of 1204 1804 notepad.exe 101 PID 1804 wrote to memory of 1204 1804 notepad.exe 101 PID 1804 wrote to memory of 1204 1804 notepad.exe 101 PID 1804 wrote to memory of 1204 1804 notepad.exe 101 PID 1804 wrote to memory of 3912 1804 notepad.exe 102 PID 1804 wrote to memory of 3912 1804 notepad.exe 102 PID 1804 wrote to memory of 3912 1804 notepad.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe"C:\Users\Admin\AppData\Local\Temp\b7733baa9e4276e1d83c5c4633f578d89923ece929d79ee0e834a22252cec3ff.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" "RegSvcs.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3840
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn curl /tr "C:\Users\Admin\AppXDeploymentServer\notepad.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3316
-
-
C:\Users\Admin\AppXDeploymentServer\notepad.exeC:\Users\Admin\AppXDeploymentServer\notepad.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn curl /tr "C:\Users\Admin\AppXDeploymentServer\notepad.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
C:\Users\Admin\AppXDeploymentServer\notepad.exeC:\Users\Admin\AppXDeploymentServer\notepad.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn curl /tr "C:\Users\Admin\AppXDeploymentServer\notepad.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3912
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418B
MD589c8a5340eb284f551067d44e27ae8dd
SHA1d2431ae25a1ab67762a5125574f046f4c951d297
SHA25673ca1f27b1c153e3405856ebe8b3c6cdd23424d2ab09c0fe1eb0e2075513057b
SHA512b101ac2e008bd3cc6f97fedb97b8253fb07fed1c334629ecbebe0f4942ccc1070491cddc4daea521164543b6f97ba9b99d2be1c50cc5a013f04e697fea9dbdac
-
Filesize
1.4MB
MD5f896c178af0bbcf694e73df31bff0ec1
SHA14e2dde0365331ddd4434a3a0e9a1416f0529f6c8
SHA2567254afdf550c0378369d306e6716a80f252eb769113ff4906eac954d8eaacaa6
SHA51281dc8b7dafe476483f655ee98346e293f894bc330ab237e850b80809f4e8d474020ed06cdefbf2be49db885bb5964057e890bd948b300e954cdbbc75c5b61cd7