Analysis
-
max time kernel
151s -
max time network
168s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 15:07
Static task
static1
Behavioral task
behavioral1
Sample
6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe
Resource
win10-en-20211208
General
-
Target
6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe
-
Size
169KB
-
MD5
d3c8ecf591381b31d3aa796471b5b0f1
-
SHA1
efb8b908c614ef0dc791e53ad579485bc6f5e33b
-
SHA256
6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39
-
SHA512
a49d1bef7ae6e40809efe3055a78ef5d2b8c8ecbafc4499c834c80c4ad7cd1aa839e9a0914902e86b1307324b4b3d8c5f097a741ec598f1a8dd333276d54748a
Malware Config
Extracted
njrat
0.7d
HacKed
hackteam1.spdns.de:448
ee43fb1332f52f77309d2a27f7deccfc
-
reg_key
ee43fb1332f52f77309d2a27f7deccfc
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exedescription pid process target process PID 1508 set thread context of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exedescription pid process Token: SeDebugPrivilege 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeDebugPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: 33 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe Token: SeIncBasePriorityPrivilege 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exedescription pid process target process PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1508 wrote to memory of 1912 1508 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe PID 1912 wrote to memory of 668 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe netsh.exe PID 1912 wrote to memory of 668 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe netsh.exe PID 1912 wrote to memory of 668 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe netsh.exe PID 1912 wrote to memory of 668 1912 6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe"C:\Users\Admin\AppData\Local\Temp\6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exeC:\Users\Admin\AppData\Local\Temp\6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe" "6bb3c42d9ed6d25bd82fa8568cee962b6e10edddc38bc5273e97e5128872ae39.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/668-57-0x0000000076911000-0x0000000076913000-memory.dmpFilesize
8KB
-
memory/1508-54-0x0000000000380000-0x00000000003B2000-memory.dmpFilesize
200KB
-
memory/1912-55-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1912-56-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1912-58-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB