Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 18:37
Static task
static1
Behavioral task
behavioral1
Sample
b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe
Resource
win10v2004-20220414-en
General
-
Target
b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe
-
Size
25KB
-
MD5
dd7950d693aa3c3d1bac162fbc706db8
-
SHA1
19fefa34076c05a5039b3dda98ba73c4a232da8c
-
SHA256
b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7
-
SHA512
0d40ea9b171d7649464b12ae3100f59848b83a405e9968a60eba7320006cf9b7672bbd74ca3bb22af3678368558ae8d631a1e283d743d93b03a7cdefcc7120a8
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exepid process 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exedescription pid process Token: SeDebugPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: 33 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe Token: SeIncBasePriorityPrivilege 1824 b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe"C:\Users\Admin\AppData\Local\Temp\b673bb347994c307b329f97a9f186607f6d6f3f7d344ee1eb5a42f5331056ca7.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken