Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 02:27
Behavioral task
behavioral1
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win10v2004-20220812-en
General
-
Target
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
-
Size
33KB
-
MD5
538a95adc47384e2b9cc837488628de8
-
SHA1
d0ead0592e2f891d1304be71ccd755c78e94adfa
-
SHA256
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
SHA512
947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
SSDEEP
384:CDKimCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZz9:oKAD7zoc86xi74q8HeoBKh0p29SgRoo
Malware Config
Extracted
njrat
0.6.4
Boy Hacker Kurdish
boyhacker.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4616 Trojan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4300 wrote to memory of 4616 4300 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe 82 PID 4300 wrote to memory of 4616 4300 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe 82 PID 4300 wrote to memory of 4616 4300 926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe"C:\Users\Admin\AppData\Local\Temp\926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
PID:4616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5538a95adc47384e2b9cc837488628de8
SHA1d0ead0592e2f891d1304be71ccd755c78e94adfa
SHA256926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
SHA512947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
Filesize
33KB
MD5538a95adc47384e2b9cc837488628de8
SHA1d0ead0592e2f891d1304be71ccd755c78e94adfa
SHA256926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
SHA512947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627