Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
-.exe
Resource
win7-20241010-en
General
-
Target
-.exe
-
Size
293KB
-
MD5
f06c6102d8eed12fa80b65b770e588e2
-
SHA1
718557418828ee4b3ef339e1c60c336c7596b9f5
-
SHA256
f63b594918769824db79881c51639de7de00dedd298f5852fe3f7ff301f2e7c8
-
SHA512
747cadee10bf202b39d84031cdc173af0ab07830249777e81d7a8d24c3e456d79160be40e99817b9c92ac033a57a97259d0a78cbc23f4760d6a6f03d0368dc66
-
SSDEEP
6144:ANtJxpaifYUc9UbvpUXjCzyz+wgzOuxOFe5HPSwusGcuI:EpaQ0UzpLyqwOOuOe5Hfudc
Malware Config
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Control Panel\International\Geo\Nation -.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe 2068 .exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 4632 -.exe Token: SeDebugPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe Token: 33 2068 .exe Token: SeIncBasePriorityPrivilege 2068 .exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2068 4632 -.exe 87 PID 4632 wrote to memory of 2068 4632 -.exe 87 PID 4632 wrote to memory of 2068 4632 -.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\-.exe"C:\Users\Admin\AppData\Local\Temp\-.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5479e476b8afa5633dd44cb2c0380f18d
SHA1b985cd125613f47b4e0ae07fec6ef29d2622d113
SHA25647abbe32c53b67302656d86e2510968255ea5fec4118e309f9d2dea2168507e7
SHA512459a12db199d5ec4e506770ca9ff3a8eadde95f43d9680386f862f8b65cbf4fcb0cda249e542430de413a6b1fe3e862ad10af967c1fdbfcb9a4b405d92546aac