Analysis
-
max time kernel
8s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2022 20:33
Behavioral task
behavioral1
Sample
4ff6f79a49a97dc667f24ba8cda3a576.exe
Resource
win7-20220901-en
General
-
Target
4ff6f79a49a97dc667f24ba8cda3a576.exe
-
Size
43KB
-
MD5
4ff6f79a49a97dc667f24ba8cda3a576
-
SHA1
58b180568f77a147d272b46fa68789624b1cdd23
-
SHA256
e0f6b466d18506eb16846285e03c050fe0f72dfcaaf55809c717ebc0c38de4f3
-
SHA512
a52d861995e405f5ea4a3727a74d39c35ec92cd0659e1ea0af95267d2bb2db8519d394a240ec9abfa5ade1912dc4393d8828916a636c514202b2404a3e827a29
-
SSDEEP
384:YZyd4g98NaIyrRBb3yw+IEJiE7azsIij+ZsNO3PlpJKkkjh/TzF7pWnd/greT0pO:u8ywFrjb3ynRwuXQ/oo/+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
4.tcp.eu.ngrok.io:18018
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
4ff6f79a49a97dc667f24ba8cda3a576.exepid process 4340 4ff6f79a49a97dc667f24ba8cda3a576.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff6f79a49a97dc667f24ba8cda3a576.exe"C:\Users\Admin\AppData\Local\Temp\4ff6f79a49a97dc667f24ba8cda3a576.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
43KB
MD54ff6f79a49a97dc667f24ba8cda3a576
SHA158b180568f77a147d272b46fa68789624b1cdd23
SHA256e0f6b466d18506eb16846285e03c050fe0f72dfcaaf55809c717ebc0c38de4f3
SHA512a52d861995e405f5ea4a3727a74d39c35ec92cd0659e1ea0af95267d2bb2db8519d394a240ec9abfa5ade1912dc4393d8828916a636c514202b2404a3e827a29
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
43KB
MD54ff6f79a49a97dc667f24ba8cda3a576
SHA158b180568f77a147d272b46fa68789624b1cdd23
SHA256e0f6b466d18506eb16846285e03c050fe0f72dfcaaf55809c717ebc0c38de4f3
SHA512a52d861995e405f5ea4a3727a74d39c35ec92cd0659e1ea0af95267d2bb2db8519d394a240ec9abfa5ade1912dc4393d8828916a636c514202b2404a3e827a29
-
memory/2700-136-0x0000000000000000-mapping.dmp
-
memory/2700-139-0x0000000005850000-0x000000000585A000-memory.dmpFilesize
40KB
-
memory/2700-140-0x0000000005A90000-0x0000000005AF6000-memory.dmpFilesize
408KB
-
memory/4340-132-0x0000000000B90000-0x0000000000BA2000-memory.dmpFilesize
72KB
-
memory/4340-133-0x0000000005570000-0x000000000560C000-memory.dmpFilesize
624KB
-
memory/4340-135-0x00000000059A0000-0x0000000005A32000-memory.dmpFilesize
584KB
-
memory/4340-134-0x0000000005EB0000-0x0000000006454000-memory.dmpFilesize
5.6MB