Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    RTP_Launcher.exe

  • Size

    11.3MB

  • Sample

    250208-q7hkxsylby

  • MD5

    27d9f65b4d7ea7f8dc76517c634be635

  • SHA1

    4baa5a473b5780ba33e749e43ef7363464bf6968

  • SHA256

    4012e6a5c71823bebc6e0992ff1415cf04ef4a5ddb93233dd6b867fc1a907c6f

  • SHA512

    b90fd210c34da79d1d7d526b1e8178c1e7fb0e5a1550eacec3492bf5843073edaa0369f7a0c81ab0996c88a20c742e385bace606b404caa5c513cbf1af68f9cc

  • SSDEEP

    196608:Zqwdlup6/j7AGXyaP+RtZoPlbxfxKLZtz4uIZoGSV1gJCUepeNxJvLW7snujIvgB:xup6lXeY5ol4uIZoG0dUQeN71ucvgB99

Malware Config

Targets

    • Target

      RTP_Launcher.exe

    • Size

      11.3MB

    • MD5

      27d9f65b4d7ea7f8dc76517c634be635

    • SHA1

      4baa5a473b5780ba33e749e43ef7363464bf6968

    • SHA256

      4012e6a5c71823bebc6e0992ff1415cf04ef4a5ddb93233dd6b867fc1a907c6f

    • SHA512

      b90fd210c34da79d1d7d526b1e8178c1e7fb0e5a1550eacec3492bf5843073edaa0369f7a0c81ab0996c88a20c742e385bace606b404caa5c513cbf1af68f9cc

    • SSDEEP

      196608:Zqwdlup6/j7AGXyaP+RtZoPlbxfxKLZtz4uIZoGSV1gJCUepeNxJvLW7snujIvgB:xup6lXeY5ol4uIZoG0dUQeN71ucvgB99

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks