Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
04-12-2021 00:47
Static task
static1
Behavioral task
behavioral1
Sample
a65eec0b9da0cc90e1254ba7594a6291.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
a65eec0b9da0cc90e1254ba7594a6291.exe
-
Size
1012KB
-
MD5
a65eec0b9da0cc90e1254ba7594a6291
-
SHA1
0692268e96272c0b0e25eb6e337fc086c7f4bda2
-
SHA256
bf05a3947e7a4140b43547581564d04991f0c339a7ac35bcb2c7bb93f7b7ae1e
-
SHA512
48464c59a7eadffbedec8a95a1fc4a0f42d3f10928e8394abefa629bd70d0a41816f3850c8e14f9c3c870f0cc56dee1c319b0290f5a78c5e4791960946c939bd
Malware Config
Extracted
Family
njrat
Version
0.7NC
Botnet
NYAN CAT
C2
milla.publicvm.com:5050
Mutex
c0dd26caedd
Attributes
-
reg_key
c0dd26caedd
-
splitter
@!#&^%$
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
a65eec0b9da0cc90e1254ba7594a6291.exedescription pid process Token: SeDebugPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: 33 3508 a65eec0b9da0cc90e1254ba7594a6291.exe Token: SeIncBasePriorityPrivilege 3508 a65eec0b9da0cc90e1254ba7594a6291.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3508-118-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/3508-120-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/3508-121-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/3508-122-0x00000000025C0000-0x00000000025C8000-memory.dmpFilesize
32KB
-
memory/3508-123-0x00000000059D0000-0x00000000059D1000-memory.dmpFilesize
4KB
-
memory/3508-124-0x0000000005750000-0x0000000005751000-memory.dmpFilesize
4KB
-
memory/3508-125-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/3508-126-0x0000000005960000-0x0000000005961000-memory.dmpFilesize
4KB