Malware Analysis Report

2025-06-16 06:50

Sample ID 220822-s9xtqshhhm
Target xjgQwkqiHeju.exe
SHA256 6aeec6592d3fe400a3523bf0a93d6d0b718bdcdc8c6fc6769cf39ff1a7a9535a
Tags
nyan cat njrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6aeec6592d3fe400a3523bf0a93d6d0b718bdcdc8c6fc6769cf39ff1a7a9535a

Threat Level: Known bad

The file xjgQwkqiHeju.exe was found to be: Known bad.

Malicious Activity Summary

nyan cat njrat

Njrat family

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-08-22 15:50

Signatures

Njrat family

njrat

Analysis: behavioral1

Detonation Overview

Submitted

2022-08-22 15:50

Reported

2022-08-22 15:52

Platform

win7-20220812-en

Max time kernel

143s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe

"C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 defenderos.con-ip.com udp
CO 191.88.250.6:2427 defenderos.con-ip.com tcp

Files

memory/1764-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

memory/1764-55-0x0000000074A40000-0x0000000074FEB000-memory.dmp

memory/1764-56-0x0000000074A40000-0x0000000074FEB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-08-22 15:50

Reported

2022-08-22 15:52

Platform

win10v2004-20220812-en

Max time kernel

150s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe

"C:\Users\Admin\AppData\Local\Temp\xjgQwkqiHeju.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 defenderos.con-ip.com udp
CO 191.88.250.6:2427 defenderos.con-ip.com tcp
US 20.189.173.2:443 tcp
US 93.184.220.29:80 tcp
BE 8.238.110.126:80 tcp
US 93.184.221.240:80 tcp

Files

memory/4756-132-0x0000000074C40000-0x00000000751F1000-memory.dmp

memory/4756-133-0x0000000074C40000-0x00000000751F1000-memory.dmp