Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
103c7b097b31...0f.exe
windows7-x64
83c7b097b31...0f.exe
windows10-2004-x64
83c8a6c6cde...86.exe
windows7-x64
103c8a6c6cde...86.exe
windows10-2004-x64
103ca3e4676b...f1.exe
windows7-x64
103ca3e4676b...f1.exe
windows10-2004-x64
103cb47c4bbe...c1.exe
windows7-x64
103cb47c4bbe...c1.exe
windows10-2004-x64
103d18edb3bf...ff.exe
windows7-x64
13d18edb3bf...ff.exe
windows10-2004-x64
3d1ee6caf0...b4.exe
windows7-x64
103d1ee6caf0...b4.exe
windows10-2004-x64
103d2f05086d...0c.exe
windows7-x64
103d2f05086d...0c.exe
windows10-2004-x64
103d81f411b0...ba.exe
windows7-x64
103d81f411b0...ba.exe
windows10-2004-x64
103d90976d58...8c.exe
windows7-x64
103d90976d58...8c.exe
windows10-2004-x64
103d97ea72c5...9e.exe
windows7-x64
103d97ea72c5...9e.exe
windows10-2004-x64
103dd452b939...18.exe
windows7-x64
33dd452b939...18.exe
windows10-2004-x64
33dfc71cfc4...bd.exe
windows7-x64
103dfc71cfc4...bd.exe
windows10-2004-x64
103e435c9ff2...57.exe
windows7-x64
103e435c9ff2...57.exe
windows10-2004-x64
103e624f48a8...2b.exe
windows7-x64
13e624f48a8...2b.exe
windows10-2004-x64
43e8acfab95...cc.exe
windows7-x64
103e8acfab95...cc.exe
windows10-2004-x64
103e9a136b97...9d.exe
windows7-x64
103e9a136b97...9d.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:25
Behavioral task
behavioral1
Sample
3c7b097b31ed5df2ce6313dddd86da0f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c7b097b31ed5df2ce6313dddd86da0f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
3c8a6c6cde2240783bed48a2f3d849a30bfa841d7cb55177721631dcec1eb086.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
3c8a6c6cde2240783bed48a2f3d849a30bfa841d7cb55177721631dcec1eb086.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
3ca3e4676bac76c4f7eaf0ab169b8af1.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3ca3e4676bac76c4f7eaf0ab169b8af1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
3cb47c4bbe6856c45fd89eb5eb2723c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3cb47c4bbe6856c45fd89eb5eb2723c1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
3d18edb3bf6b0493a6572edd73f937ff.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
3d18edb3bf6b0493a6572edd73f937ff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
3d1ee6caf0803c689aa17a8bada108bd515a77493a9d76dca7d55762bb6d33b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3d1ee6caf0803c689aa17a8bada108bd515a77493a9d76dca7d55762bb6d33b4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
3d2f05086d9da9564c7c7e945875e80c.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
3d2f05086d9da9564c7c7e945875e80c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3d81f411b0ec1ac7d861358e145db4ba.exe
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
3d81f411b0ec1ac7d861358e145db4ba.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
3d97ea72c561c7d15574a99be582c59e.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
3d97ea72c561c7d15574a99be582c59e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
3dd452b9394976fd7b431d3dbae57d18.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
3dd452b9394976fd7b431d3dbae57d18.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
3dfc71cfc45034d671ac0f319bc080bd.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
3dfc71cfc45034d671ac0f319bc080bd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
3e435c9ff25f6dca4a3e7262825aa557.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
3e435c9ff25f6dca4a3e7262825aa557.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral27
Sample
3e624f48a849ad8a70e09f6d4e75f02b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
3e624f48a849ad8a70e09f6d4e75f02b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
3e8acfab95493518077e0028fd0f2dcc.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
3e8acfab95493518077e0028fd0f2dcc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
3e9a136b97b7ad7104019ae696b4f59d.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
3e9a136b97b7ad7104019ae696b4f59d.exe
Resource
win10v2004-20250314-en
General
-
Target
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe
-
Size
587KB
-
MD5
58388ff123bd5e52aa3e7fa34cfa8a7f
-
SHA1
6b43aa7430ad9e446acf2f8d04ecb8f6b6eaa4c5
-
SHA256
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c
-
SHA512
a4b5405d5e0c4f555e151c207c2d6d38e52b3dc3c59f3629729cec2578dc0426621b8f321ce770e69270e974e1d96f6eacc6d38d2f9b89c6aed4ed4ce397a991
-
SSDEEP
12288:tZFFZDJe6R3dvAheWxnMbbY1wLBuYEAmDUDAc5c:tZnR3ROWblBuYVD
Malware Config
Extracted
njrat
0.7d
Lammer
8f04f9cf1cb0a66772ec936fb174701b
-
reg_key
8f04f9cf1cb0a66772ec936fb174701b
-
splitter
|'|'|
Signatures
-
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 2688 Trojan.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2108 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2108 AcroRd32.exe 2108 AcroRd32.exe 2108 AcroRd32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2108 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 30 PID 2040 wrote to memory of 2108 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 30 PID 2040 wrote to memory of 2108 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 30 PID 2040 wrote to memory of 2108 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 30 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2040 wrote to memory of 2368 2040 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 31 PID 2368 wrote to memory of 2688 2368 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 33 PID 2368 wrote to memory of 2688 2368 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 33 PID 2368 wrote to memory of 2688 2368 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 33 PID 2368 wrote to memory of 2688 2368 3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe"C:\Users\Admin\AppData\Local\Temp\3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\Proposta.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe"C:\Users\Admin\AppData\Local\Temp\3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\Trojan.exe"C:\Users\Admin\AppData\Roaming\Trojan.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5699abbb3e5345bd8c94022e2b7ad326d
SHA1ede415618d613acf06a04cc867784cd3aadbc07d
SHA256cd597b5280a854fe29c73a29b26e01f3aa73ea26554b29cc7364460c18359d0b
SHA512365fa0897fe122b729b756b7d47d97e49c5981cd92046bec3d442a06bc70087cbdebd8a515f214e52b7cc3535cd261f6d0040ff72584bc5c42e5f3475b032def
-
Filesize
210KB
MD511dd9b4f7e3b192fb7b570a1dd587945
SHA10696d05623ee0b34e3b71bbd1ed69e04180848c5
SHA2564a90c56d35a677dd9bf91a9a89ae8396936cb47b5fdf6094b582d2208c76cd96
SHA5128aa5c5d7d522c14287d10db92ee7378f22ca96e18ae453b5cd7b72ac95207736b7ad721e08454de1cc5dec0387f455dac83cbd09144db711fdfe5591034a0f19
-
Filesize
587KB
MD558388ff123bd5e52aa3e7fa34cfa8a7f
SHA16b43aa7430ad9e446acf2f8d04ecb8f6b6eaa4c5
SHA2563d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c
SHA512a4b5405d5e0c4f555e151c207c2d6d38e52b3dc3c59f3629729cec2578dc0426621b8f321ce770e69270e974e1d96f6eacc6d38d2f9b89c6aed4ed4ce397a991