Analysis
-
max time kernel
151s -
max time network
204s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:43
Behavioral task
behavioral1
Sample
92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe
Resource
win10v2004-20221111-en
General
-
Target
92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe
-
Size
29KB
-
MD5
b50485b9d4c229edfc6ec487c2867001
-
SHA1
d24156759a2d4a5b09165a050f3e46055ba86f5e
-
SHA256
92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba
-
SHA512
f1bbaa3fa022f473a3fd8cdeeefcfeb51caefea4eb5f8c0f285210048d74f1843cd51fc459844ad5ee11af6aed5697e184f0aa6f3c4013674ca014731a0cb95f
-
SSDEEP
384:C7hkrLGN8fNl7L5H4yAyr9n95/K4ZoumqDYcqeYtGBsbh0w4wlAokw9OhgOL1vY:C67R4yAy944Aq1qe5BKh0p29SgRNYF
Malware Config
Extracted
njrat
0.6.4
HacKed
awaear.no-biz:1999
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 884 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1552 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe 884 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 884 Trojan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1528 wrote to memory of 884 1528 92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe 28 PID 1528 wrote to memory of 884 1528 92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe 28 PID 1528 wrote to memory of 884 1528 92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe 28 PID 1528 wrote to memory of 884 1528 92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe 28 PID 884 wrote to memory of 1552 884 Trojan.exe 29 PID 884 wrote to memory of 1552 884 Trojan.exe 29 PID 884 wrote to memory of 1552 884 Trojan.exe 29 PID 884 wrote to memory of 1552 884 Trojan.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe"C:\Users\Admin\AppData\Local\Temp\92008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5b50485b9d4c229edfc6ec487c2867001
SHA1d24156759a2d4a5b09165a050f3e46055ba86f5e
SHA25692008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba
SHA512f1bbaa3fa022f473a3fd8cdeeefcfeb51caefea4eb5f8c0f285210048d74f1843cd51fc459844ad5ee11af6aed5697e184f0aa6f3c4013674ca014731a0cb95f
-
Filesize
29KB
MD5b50485b9d4c229edfc6ec487c2867001
SHA1d24156759a2d4a5b09165a050f3e46055ba86f5e
SHA25692008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba
SHA512f1bbaa3fa022f473a3fd8cdeeefcfeb51caefea4eb5f8c0f285210048d74f1843cd51fc459844ad5ee11af6aed5697e184f0aa6f3c4013674ca014731a0cb95f
-
Filesize
29KB
MD5b50485b9d4c229edfc6ec487c2867001
SHA1d24156759a2d4a5b09165a050f3e46055ba86f5e
SHA25692008a3e8cc1b31edc5a6a99f2973bac0330a25b1a951b1db3bc034b0a9b3aba
SHA512f1bbaa3fa022f473a3fd8cdeeefcfeb51caefea4eb5f8c0f285210048d74f1843cd51fc459844ad5ee11af6aed5697e184f0aa6f3c4013674ca014731a0cb95f