Analysis
-
max time kernel
156s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 14:16
Static task
static1
Behavioral task
behavioral1
Sample
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe
Resource
win7-en-20211208
General
-
Target
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe
-
Size
290KB
-
MD5
f59453d2ff8f29617db23201c568017c
-
SHA1
d8661b18423c8702e618e5d9583bf208d7d3259f
-
SHA256
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f
-
SHA512
24f73e9a92f07d62f2978ee19f66f2bc33407f19029b5df7e1a01ab4a0bbf4c040c7a7c25383ba197a810833880d0df6224d79af17d826c0fa4134900a06e14e
Malware Config
Extracted
njrat
0.7d
HacKed
hp600.spdns.eu:447
34f79db3bf3ee508616c80dd801e45fb
-
reg_key
34f79db3bf3ee508616c80dd801e45fb
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exedescription pid process target process PID 1624 set thread context of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXEdescription pid process Token: SeDebugPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exepid process 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXEdescription pid process target process PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 1624 wrote to memory of 960 1624 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 960 wrote to memory of 548 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE netsh.exe PID 960 wrote to memory of 548 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE netsh.exe PID 960 wrote to memory of 548 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE netsh.exe PID 960 wrote to memory of 548 960 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe"C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE"C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE" "482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/960-56-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/960-57-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/960-58-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/960-60-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/960-59-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/960-62-0x0000000000020000-0x000000000002C000-memory.dmpFilesize
48KB
-
memory/960-61-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/960-64-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/960-65-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/960-67-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/960-68-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/960-66-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/960-69-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/960-70-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/960-71-0x0000000075761000-0x0000000075763000-memory.dmpFilesize
8KB
-
memory/960-72-0x0000000001FE0000-0x0000000001FE1000-memory.dmpFilesize
4KB