Analysis
-
max time kernel
149s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:27
Behavioral task
behavioral1
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win10v2004-20220812-en
General
-
Target
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
-
Size
33KB
-
MD5
538a95adc47384e2b9cc837488628de8
-
SHA1
d0ead0592e2f891d1304be71ccd755c78e94adfa
-
SHA256
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
SHA512
947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
SSDEEP
384:CDKimCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZz9:oKAD7zoc86xi74q8HeoBKh0p29SgRoo
Malware Config
Extracted
njrat
0.6.4
Boy Hacker Kurdish
boyhacker.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1552 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1716 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1672 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe 1552 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1552 Trojan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1552 1672 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe 27 PID 1672 wrote to memory of 1552 1672 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe 27 PID 1672 wrote to memory of 1552 1672 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe 27 PID 1672 wrote to memory of 1552 1672 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe 27 PID 1552 wrote to memory of 1716 1552 Trojan.exe 28 PID 1552 wrote to memory of 1716 1552 Trojan.exe 28 PID 1552 wrote to memory of 1716 1552 Trojan.exe 28 PID 1552 wrote to memory of 1716 1552 Trojan.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe"C:\Users\Admin\AppData\Local\Temp\926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1716
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5538a95adc47384e2b9cc837488628de8
SHA1d0ead0592e2f891d1304be71ccd755c78e94adfa
SHA256926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
SHA512947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
Filesize
33KB
MD5538a95adc47384e2b9cc837488628de8
SHA1d0ead0592e2f891d1304be71ccd755c78e94adfa
SHA256926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
SHA512947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
Filesize
33KB
MD5538a95adc47384e2b9cc837488628de8
SHA1d0ead0592e2f891d1304be71ccd755c78e94adfa
SHA256926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
SHA512947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627