Analysis Overview
SHA256
cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b
Threat Level: Known bad
The file ZX2.exe was found to be: Known bad.
Malicious Activity Summary
Njrat family
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-10-10 16:35
Signatures
Njrat family
Analysis: behavioral2
Detonation Overview
Submitted
2022-10-10 16:35
Reported
2022-10-10 16:37
Platform
win10v2004-20220901-en
Max time kernel
112s
Max time network
152s
Command Line
Signatures
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 372 wrote to memory of 2848 | N/A | C:\Users\Admin\AppData\Local\Temp\ZX2.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 372 wrote to memory of 2848 | N/A | C:\Users\Admin\AppData\Local\Temp\ZX2.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 372 wrote to memory of 2848 | N/A | C:\Users\Admin\AppData\Local\Temp\ZX2.exe | C:\Windows\SysWOW64\cmd.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\ZX2.exe
"C:\Users\Admin\AppData\Local\Temp\ZX2.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\ZX2.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | nyas22.duckdns.org | udp |
| US | 64.44.167.136:57831 | nyas22.duckdns.org | tcp |
| US | 20.42.65.84:443 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 64.44.167.136:57831 | nyas22.duckdns.org | tcp |
| US | 93.184.221.240:80 | tcp | |
| NL | 104.80.229.204:443 | tcp |
Files
memory/372-132-0x0000000074D40000-0x00000000752F1000-memory.dmp
memory/372-133-0x0000000074D40000-0x00000000752F1000-memory.dmp
memory/2848-134-0x0000000000000000-mapping.dmp
memory/372-135-0x0000000074D40000-0x00000000752F1000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2022-10-10 16:35
Reported
2022-10-10 16:37
Platform
win7-20220812-en
Max time kernel
113s
Max time network
116s
Command Line
Signatures
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1948 wrote to memory of 1196 | N/A | C:\Users\Admin\AppData\Local\Temp\ZX2.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 1948 wrote to memory of 1196 | N/A | C:\Users\Admin\AppData\Local\Temp\ZX2.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 1948 wrote to memory of 1196 | N/A | C:\Users\Admin\AppData\Local\Temp\ZX2.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 1948 wrote to memory of 1196 | N/A | C:\Users\Admin\AppData\Local\Temp\ZX2.exe | C:\Windows\SysWOW64\cmd.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\ZX2.exe
"C:\Users\Admin\AppData\Local\Temp\ZX2.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\ZX2.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | nyas22.duckdns.org | udp |
| US | 64.44.167.136:57831 | nyas22.duckdns.org | tcp |
| US | 64.44.167.136:57831 | nyas22.duckdns.org | tcp |
Files
memory/1948-54-0x0000000075F51000-0x0000000075F53000-memory.dmp
memory/1948-55-0x0000000073FC0000-0x000000007456B000-memory.dmp
memory/1948-56-0x0000000073FC0000-0x000000007456B000-memory.dmp
memory/1948-57-0x0000000000B25000-0x0000000000B36000-memory.dmp
memory/1948-58-0x0000000000B25000-0x0000000000B36000-memory.dmp
memory/1196-59-0x0000000000000000-mapping.dmp
memory/1948-60-0x0000000073FC0000-0x000000007456B000-memory.dmp
memory/1948-61-0x0000000000B25000-0x0000000000B36000-memory.dmp