Analysis
-
max time kernel
157s -
max time network
170s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 14:16
Static task
static1
Behavioral task
behavioral1
Sample
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe
-
Size
290KB
-
MD5
f59453d2ff8f29617db23201c568017c
-
SHA1
d8661b18423c8702e618e5d9583bf208d7d3259f
-
SHA256
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f
-
SHA512
24f73e9a92f07d62f2978ee19f66f2bc33407f19029b5df7e1a01ab4a0bbf4c040c7a7c25383ba197a810833880d0df6224d79af17d826c0fa4134900a06e14e
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
hp600.spdns.eu:447
Mutex
34f79db3bf3ee508616c80dd801e45fb
Attributes
-
reg_key
34f79db3bf3ee508616c80dd801e45fb
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exedescription pid process target process PID 2672 set thread context of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXEdescription pid process Token: SeDebugPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: 33 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE Token: SeIncBasePriorityPrivilege 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exepid process 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXEdescription pid process target process PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2672 wrote to memory of 2708 2672 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE PID 2708 wrote to memory of 424 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE netsh.exe PID 2708 wrote to memory of 424 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE netsh.exe PID 2708 wrote to memory of 424 2708 482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe"C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE"C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE" "482a76620997037b6109d7cf782ccd75b5b6a754eef86eff9bbf5b604ef34b0f.EXE" ENABLE3⤵PID:424
-
-