Analysis
-
max time kernel
149s -
max time network
193s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-09-2021 09:51
Static task
static1
Behavioral task
behavioral1
Sample
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe
-
Size
91KB
-
MD5
8e0342b0a50e046c2b22f6d9548024eb
-
SHA1
0378936325dd0a19ac2547ad462017db60d9d315
-
SHA256
04e1a14639f9fd0903f21edd99b1cadc9267b0ac2f402863d6eb3acc4d48acf7
-
SHA512
cc9a2a0bcfbfd686b7be8487cc95eec046b30a46878cea40a457082478b5b6f00965b54d81cf4a3b7659fd087a27e0f0ad1c6f47cbbab7ff82f5b5bc3fb95876
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
kanichnadia.duckdns.org:1979
Mutex
c9b81cdf127358c4e9ff59acf837f3c6
Attributes
-
reg_key
c9b81cdf127358c4e9ff59acf837f3c6
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exedescription pid process Token: SeDebugPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exedescription pid process target process PID 1276 wrote to memory of 1668 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe netsh.exe PID 1276 wrote to memory of 1668 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe netsh.exe PID 1276 wrote to memory of 1668 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe netsh.exe PID 1276 wrote to memory of 1668 1276 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe"C:\Users\Admin\AppData\Local\Temp\04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe" "04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe" ENABLE2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1276-59-0x00000000011A0000-0x00000000011A1000-memory.dmpFilesize
4KB
-
memory/1276-61-0x0000000004960000-0x0000000004961000-memory.dmpFilesize
4KB
-
memory/1276-62-0x0000000000470000-0x0000000000476000-memory.dmpFilesize
24KB
-
memory/1668-63-0x0000000000000000-mapping.dmp
-
memory/1668-64-0x0000000075B31000-0x0000000075B33000-memory.dmpFilesize
8KB