Analysis Overview
SHA256
a477b35d5df3c1a449e42026ad7d26b17579d3f519263be93352a6014326b179
Threat Level: Known bad
The file cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.zip was found to be: Known bad.
Malicious Activity Summary
Njrat family
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-10-10 21:12
Signatures
Njrat family
Analysis: behavioral1
Detonation Overview
Submitted
2022-10-10 21:12
Reported
2022-10-10 21:14
Platform
win7-20220901-en
Max time kernel
142s
Max time network
145s
Command Line
Signatures
Suspicious use of AdjustPrivilegeToken
Processes
C:\Users\Admin\AppData\Local\Temp\cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe
"C:\Users\Admin\AppData\Local\Temp\cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | nyas22.duckdns.org | udp |
| US | 64.44.167.136:57831 | nyas22.duckdns.org | tcp |
Files
memory/1900-54-0x00000000759F1000-0x00000000759F3000-memory.dmp
memory/1900-55-0x0000000074A00000-0x0000000074FAB000-memory.dmp
memory/1900-56-0x0000000074A00000-0x0000000074FAB000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-10-10 21:12
Reported
2022-10-10 21:14
Platform
win10v2004-20220812-en
Max time kernel
149s
Max time network
153s
Command Line
Signatures
Suspicious use of AdjustPrivilegeToken
Processes
C:\Users\Admin\AppData\Local\Temp\cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe
"C:\Users\Admin\AppData\Local\Temp\cbc4c00395ee3d24d1f5a1dd64cfb0b74648f0371a0665287dd8108181e7668b.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | nyas22.duckdns.org | udp |
| US | 64.44.167.136:57831 | nyas22.duckdns.org | tcp |
| US | 93.184.220.29:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| NL | 104.80.225.205:443 | tcp | |
| US | 93.184.220.29:80 | tcp |
Files
memory/3232-132-0x0000000075340000-0x00000000758F1000-memory.dmp
memory/3232-133-0x0000000075340000-0x00000000758F1000-memory.dmp