Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 20:25
Static task
static1
Behavioral task
behavioral1
Sample
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe
Resource
win10-en-20211208
General
-
Target
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe
-
Size
563KB
-
MD5
520d99a761256efa473281d597886d42
-
SHA1
30fe6c541971404e7d51b0dfd47afd973481286c
-
SHA256
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a
-
SHA512
6de782abf5b5db8b8215b872fa6015cf78597bf22eacaf6ff2e58cc4af2c166c3f912ae12c2266763189df2f9b0da5aaaa9f0713340205e95c37705a3a320821
Malware Config
Extracted
njrat
0.6.4
Upload C.D.T
office365update.duckdns.org:2000
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exedescription pid process target process PID 960 set thread context of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exepid process 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exedescription pid process Token: SeDebugPrivilege 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe Token: SeDebugPrivilege 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exedescription pid process target process PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 960 wrote to memory of 700 960 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe PID 700 wrote to memory of 1436 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe netsh.exe PID 700 wrote to memory of 1436 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe netsh.exe PID 700 wrote to memory of 1436 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe netsh.exe PID 700 wrote to memory of 1436 700 6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe"C:\Users\Admin\AppData\Local\Temp\6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exeC:\Users\Admin\AppData\Local\Temp\6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe" "6c45909d6311f8d356ddc704b27bd975cb3336a7b6e172206165bff613f94a2a.exe" ENABLE3⤵PID:1436
-
-