Malware Analysis Report

2025-06-16 06:50

Sample ID 221010-t26bkscgcj
Target Client1.exe
SHA256 b5c7d7927b10416007f1752f95e972ca21bc6f4e3ecad0efbcd1b57591430b2e
Tags
nyan cat njrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b5c7d7927b10416007f1752f95e972ca21bc6f4e3ecad0efbcd1b57591430b2e

Threat Level: Known bad

The file Client1.exe was found to be: Known bad.

Malicious Activity Summary

nyan cat njrat

Njrat family

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-10-10 16:34

Signatures

Njrat family

njrat

Analysis: behavioral1

Detonation Overview

Submitted

2022-10-10 16:34

Reported

2022-10-10 16:36

Platform

win7-20220812-en

Max time kernel

143s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client1.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client1.exe

"C:\Users\Admin\AppData\Local\Temp\Client1.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 nsdeck.duckdns.org udp
US 64.44.167.136:57829 nsdeck.duckdns.org tcp

Files

memory/1100-54-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

memory/1100-55-0x00000000740B0000-0x000000007465B000-memory.dmp

memory/1100-56-0x00000000740B0000-0x000000007465B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-10-10 16:34

Reported

2022-10-10 16:36

Platform

win10v2004-20220812-en

Max time kernel

149s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client1.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client1.exe

"C:\Users\Admin\AppData\Local\Temp\Client1.exe"

Network

Country Destination Domain Proto
DE 23.88.115.141:80 tcp
US 8.8.8.8:53 nsdeck.duckdns.org udp
US 64.44.167.136:57829 nsdeck.duckdns.org tcp
US 198.135.55.114:80 tcp
US 198.135.55.114:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
DE 20.52.64.200:443 tcp
NL 87.248.202.1:80 tcp
FR 31.14.70.246:443 tcp
FR 51.38.43.18:443 tcp

Files

memory/1656-132-0x0000000075340000-0x00000000758F1000-memory.dmp

memory/1656-133-0x0000000075340000-0x00000000758F1000-memory.dmp