Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2025, 19:00

General

  • Target

    -.exe

  • Size

    293KB

  • MD5

    f06c6102d8eed12fa80b65b770e588e2

  • SHA1

    718557418828ee4b3ef339e1c60c336c7596b9f5

  • SHA256

    f63b594918769824db79881c51639de7de00dedd298f5852fe3f7ff301f2e7c8

  • SHA512

    747cadee10bf202b39d84031cdc173af0ab07830249777e81d7a8d24c3e456d79160be40e99817b9c92ac033a57a97259d0a78cbc23f4760d6a6f03d0368dc66

  • SSDEEP

    6144:ANtJxpaifYUc9UbvpUXjCzyz+wgzOuxOFe5HPSwusGcuI:EpaQ0UzpLyqwOOuOe5Hfudc

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

F9t family

C2

package-foods.gl.at.ply.gg:41749

Mutex

e3a50f6652cdfc171e08492715312126

Attributes
  • reg_key

    e3a50f6652cdfc171e08492715312126

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\-.exe
    "C:\Users\Admin\AppData\Local\Temp\-.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\.exe
      "C:\Users\Admin\AppData\Local\Temp\.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start shutdown /l /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Windows\SysWOW64\shutdown.exe
          shutdown /l /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2612
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:320
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2908
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\.exe

      Filesize

      55KB

      MD5

      479e476b8afa5633dd44cb2c0380f18d

      SHA1

      b985cd125613f47b4e0ae07fec6ef29d2622d113

      SHA256

      47abbe32c53b67302656d86e2510968255ea5fec4118e309f9d2dea2168507e7

      SHA512

      459a12db199d5ec4e506770ca9ff3a8eadde95f43d9680386f862f8b65cbf4fcb0cda249e542430de413a6b1fe3e862ad10af967c1fdbfcb9a4b405d92546aac

    • memory/2728-4-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-17-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-3-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-0-0x000007FEF515E000-0x000007FEF515F000-memory.dmp

      Filesize

      4KB

    • memory/2728-5-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-6-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-13-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-1-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-2-0x000007FEF4EA0000-0x000007FEF583D000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-18-0x000007FEF515E000-0x000007FEF515F000-memory.dmp

      Filesize

      4KB

    • memory/2816-16-0x0000000073FE0000-0x000000007458B000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-15-0x0000000073FE0000-0x000000007458B000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-14-0x0000000073FE1000-0x0000000073FE2000-memory.dmp

      Filesize

      4KB

    • memory/2816-19-0x0000000073FE0000-0x000000007458B000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-20-0x0000000073FE0000-0x000000007458B000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-21-0x0000000073FE0000-0x000000007458B000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-22-0x0000000073FE0000-0x000000007458B000-memory.dmp

      Filesize

      5.7MB

    • memory/2816-23-0x0000000073FE0000-0x000000007458B000-memory.dmp

      Filesize

      5.7MB