Analysis

  • max time kernel
    186s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 14:47

General

  • Target

    721216f6098893f78ccb62cff66865d99574bb84037ba362dc34d1701c998aa7.exe

  • Size

    219KB

  • MD5

    59dc3967141ca52cb7ca453e49466c2c

  • SHA1

    1e8b462485397258d714de677bb51c39c0ad71bd

  • SHA256

    721216f6098893f78ccb62cff66865d99574bb84037ba362dc34d1701c998aa7

  • SHA512

    1dc35f36cdc9ba324dbe2111a184e8c32f8028f0e64b70632d0b3cb335067425540ea2e6d8277952210b59b5fa9895409061dfb79a51bc73bf5d0aa5935ac81f

  • SSDEEP

    3072:y07eXGQEShPWt1/2Rxvbd44G2vt2e+AVCm+QKNFknJG39OsTh3m28LWv1:8GtSVO1+RVhG8keXv2K/K

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

غروف الثالث

C2

wwee222.zapto.org:443

Mutex

d5a38e9b5f206c41f8851bf04a251d26

Attributes
  • reg_key

    d5a38e9b5f206c41f8851bf04a251d26

  • splitter

    |'|'|

Signatures

  • Detect Neshta payload 29 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 5 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\721216f6098893f78ccb62cff66865d99574bb84037ba362dc34d1701c998aa7.exe
    "C:\Users\Admin\AppData\Local\Temp\721216f6098893f78ccb62cff66865d99574bb84037ba362dc34d1701c998aa7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Users\Admin\AppData\Local\Temp\njRat Crypter.exe
      "C:\Users\Admin\AppData\Local\Temp\njRat Crypter.exe"
      2⤵
      • Executes dropped EXE
      PID:1148
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Users\Admin\AppData\Local\Temp\3582-490\Server.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\Server.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:812
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1472
          • C:\Users\Admin\AppData\Local\Temp\chrome.exe
            C:\Users\Admin\AppData\Local\Temp\chrome.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1760
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\chrome.exe" "chrome.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
    Filesize

    859KB

    MD5

    02ee6a3424782531461fb2f10713d3c1

    SHA1

    b581a2c365d93ebb629e8363fd9f69afc673123f

    SHA256

    ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

    SHA512

    6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
    Filesize

    186KB

    MD5

    58b58875a50a0d8b5e7be7d6ac685164

    SHA1

    1e0b89c1b2585c76e758e9141b846ed4477b0662

    SHA256

    2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae

    SHA512

    d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
    Filesize

    1.1MB

    MD5

    566ed4f62fdc96f175afedd811fa0370

    SHA1

    d4b47adc40e0d5a9391d3f6f2942d1889dd2a451

    SHA256

    e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460

    SHA512

    cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

  • C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe
    Filesize

    381KB

    MD5

    3ec4922dbca2d07815cf28144193ded9

    SHA1

    75cda36469743fbc292da2684e76a26473f04a6d

    SHA256

    0587fd366ea7e94b3ae500874b1c5d684b5357fcc7389682d5a13c3301a28801

    SHA512

    956c3a1f2689cb72600edd2e90d652b77592a8a81d319dce026e88f6c02231af06aebd57d68460eb406de00c113522173423cb1b339a41a3918f379c7dc311f7

  • C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE
    Filesize

    140KB

    MD5

    e584c29c854081c78a366fbcc6f7f84c

    SHA1

    32b7e552e5916b43d57d7b088c543b77f1067338

    SHA256

    b2748833775c7c1bfce6959afbd5e472f6ff40497ee1a0b4c16d210270c56450

    SHA512

    c2e1d90d30f8799e4871c3eb87a2bff6b2ec7e46324027f4590503505808600db41583805d265786771a53f658b2d4b0edea85c85b9ae88850119cc0a682be0c

  • C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE
    Filesize

    191KB

    MD5

    dd5586c90fad3d0acb402c1aab8f6642

    SHA1

    3440cd9e78d4e4b3c2f5ba31435cedaa559e5c7f

    SHA256

    fba2b9270ade0ce80e8dfc5e3279db683324502f6103e451cd090c69da56415e

    SHA512

    e56f6d6b446411ba4ed24f0d113953d9c9e874b2ac4511d33e5c5b85dddd81216579695e35c34b6054c187b00ee214d5648594dad498297f487f2fd47f040a4d

  • C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE
    Filesize

    366KB

    MD5

    9e63bd6a4360beabbc82ed4a2f03522e

    SHA1

    10961b7873ce3b99939ab5abd634b0f771dc6436

    SHA256

    c8f05c107ecdc905dd2b3c708c40eb50118a65d497e12df6958ce5e1a53af108

    SHA512

    ae72061d3c198cdd9dd4eb17651b6532f3d6016651d943ae23c82d11d1b8b8c86679f0d516d1050f258e445edd7447019fbdb24d897bb919807ff8c449e04925

  • C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe
    Filesize

    129KB

    MD5

    b1e0da67a985533914394e6b8ac58205

    SHA1

    5a65e6076f592f9ea03af582d19d2407351ba6b6

    SHA256

    67629b025fed676bd607094fa7f21550e18c861495ba664ee0d2b215a4717d7f

    SHA512

    188ebb9a58565ca7ed81a46967a66d583f7dea43a2fc1fe8076a79ef4a83119ccaa22f948a944abae8f64b3a4b219f5184260eff7201eb660c321f6c0d1eba22

  • C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE
    Filesize

    188KB

    MD5

    92ee5c55aca684cd07ed37b62348cd4e

    SHA1

    6534d1bc8552659f19bcc0faaa273af54a7ae54b

    SHA256

    bee98e2150e02ad6259184a35e02e75df96291960032b3085535fb0f1f282531

    SHA512

    fc9f4569a5f3de81d6a490f0fff4765698cdc891933979a3ce661a6291b606630a0c2b15647fc661109fcea466c7a78552b9cfbca6c5b2079ea1632a9f1b6e22

  • C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE
    Filesize

    303KB

    MD5

    d1a96b9e854ae3cfb79cdd043eb10f4b

    SHA1

    d45025f0067ef3d43c5352088090ecfac2fa9b10

    SHA256

    f9e81ae9e3d730823abdd932e53889c61e469eb8da73291e684ecc2b1fc2f144

    SHA512

    10cce16ab326992c5e5ba980d82af6042e2dfd7e7105d20e59d9a497c68f87ad8396ef4f57d0f2816bcac5a19cff789f1643dbccfa0811e481d140b15ddaee58

  • C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE
    Filesize

    3.7MB

    MD5

    190f86b158c5af4624b30b70e4f98fa6

    SHA1

    6d2304a5a3b7503c3600f79d0657fa6ca2232e14

    SHA256

    443c2ef79c5df0b1ce3c2c180078dd423dee18f7d9decf16b3896f9cdae213f1

    SHA512

    e1a4bc4669f24da0608c51551ed1d62407d6466be04b4ff12228b067503ab55660f27a55d9e865571a49b8344aee49ac762e314db7f4411a5a01d73e7c15ca0b

  • C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE
    Filesize

    1.9MB

    MD5

    cdbe34fca2872ab1661c141d28ec1b9b

    SHA1

    340d5005409f662b2f2347b5940e235c9785748c

    SHA256

    8c1b01b836e1173ecf5072c886d939957871af7031440697df813fa55fcde096

    SHA512

    765df7c767109647b2c22dfc9dec2b3fdb0dd77ba2de796a04897cfc68b285e19bddddc3d1324558f6ee6a7dfb6cc43a732efc1e323c11d87021db4330510e78

  • C:\PROGRA~2\MOZILL~1\UNINST~1.EXE
    Filesize

    129KB

    MD5

    e7d2d4bedb99f13e7be8338171e56dbf

    SHA1

    8dafd75ae2c13d99e5ef8c0e9362a445536c31b5

    SHA256

    c8ef54853df3a3b64aa4b1ecfb91615d616c7ff998589e5a3434118611ad2a24

    SHA512

    2017dea799cc03b02a17e3616fb6fbe8c86ab2450b1aaf147fce1e67cc472ded12befd686d395386ffdaa992145996eb421d61d3a922cea45e94ac40eef76adc

  • C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
    Filesize

    674KB

    MD5

    97510a7d9bf0811a6ea89fad85a9f3f3

    SHA1

    2ac0c49b66a92789be65580a38ae9798237711db

    SHA256

    c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea

    SHA512

    2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

  • C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE
    Filesize

    715KB

    MD5

    f34835c1f458f93cd9041bfa7d01ee7d

    SHA1

    283ac4059492a22e10f7fcef219e52e0400a8926

    SHA256

    afc5cc567db1a3318c89dd0efad2ca60a353290bc25d98bbbba8e6f1492e23b1

    SHA512

    d5cc2244f1b6492dd9e66c6e917c2dfaa11376d4a8d1dea2c241cd35ce947ad919e47d1a78dea0c1f6cd6fa1e74426f806ddcf9ed3e8f25a9ae7c370b09e6857

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE
    Filesize

    485KB

    MD5

    86749cd13537a694795be5d87ef7106d

    SHA1

    538030845680a8be8219618daee29e368dc1e06c

    SHA256

    8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5

    SHA512

    7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

  • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
    Filesize

    674KB

    MD5

    97510a7d9bf0811a6ea89fad85a9f3f3

    SHA1

    2ac0c49b66a92789be65580a38ae9798237711db

    SHA256

    c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea

    SHA512

    2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

  • C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE
    Filesize

    715KB

    MD5

    f34835c1f458f93cd9041bfa7d01ee7d

    SHA1

    283ac4059492a22e10f7fcef219e52e0400a8926

    SHA256

    afc5cc567db1a3318c89dd0efad2ca60a353290bc25d98bbbba8e6f1492e23b1

    SHA512

    d5cc2244f1b6492dd9e66c6e917c2dfaa11376d4a8d1dea2c241cd35ce947ad919e47d1a78dea0c1f6cd6fa1e74426f806ddcf9ed3e8f25a9ae7c370b09e6857

  • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE
    Filesize

    495KB

    MD5

    9597098cfbc45fae685d9480d135ed13

    SHA1

    84401f03a7942a7e4fcd26e4414b227edd9b0f09

    SHA256

    45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c

    SHA512

    16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

  • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
    Filesize

    525KB

    MD5

    261b20dc81bdd7def64bc1bcee858a37

    SHA1

    75965a4be13e839a39685bc818c79cd98c0edb10

    SHA256

    63927b22c5fc994790c3365460bd421f587138b7074aabe046e379f428ab4298

    SHA512

    6e76356b663e131d7eabdfee3b2ce80934f7630593d84cdd1566991e02bf38d60337ce2a1c893f7b9c35bdf8cc44b84ae9855b1e13f94d257ed70206a125f330

  • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
    Filesize

    495KB

    MD5

    07e194ce831b1846111eb6c8b176c86e

    SHA1

    b9c83ec3b0949cb661878fb1a8b43a073e15baf1

    SHA256

    d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac

    SHA512

    55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

  • C:\Users\Admin\AppData\Local\Temp\3582-490\Server.exe
    Filesize

    78KB

    MD5

    140c2635f0083c6c50492a05b65f20e8

    SHA1

    212f47d46a0ae777865ee088c858bc5350050412

    SHA256

    bce892d02cc15c25a97be62b1875b5e5d6b0f71e5968b03f5df95d9e8afb4644

    SHA512

    dde4fbab2fd7501f3562cf642972fee880bd123ae133df27ba558018b54f249522a70ebb9020db25227541d2f2c7556066d2b5c36ffd451252cdb43b39256b5b

  • C:\Users\Admin\AppData\Local\Temp\3582-490\Server.exe
    Filesize

    78KB

    MD5

    140c2635f0083c6c50492a05b65f20e8

    SHA1

    212f47d46a0ae777865ee088c858bc5350050412

    SHA256

    bce892d02cc15c25a97be62b1875b5e5d6b0f71e5968b03f5df95d9e8afb4644

    SHA512

    dde4fbab2fd7501f3562cf642972fee880bd123ae133df27ba558018b54f249522a70ebb9020db25227541d2f2c7556066d2b5c36ffd451252cdb43b39256b5b

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    Filesize

    119KB

    MD5

    98e2bfd9abdfb3a3d2b5ede403268f17

    SHA1

    f8d5fa6b524835efde55e6dd0b478c8bb2dd6a7e

    SHA256

    e777cd79db5c1da310a63f207c0134458e958e3c915ef1582f61a0a4248131fd

    SHA512

    c208f4eb27e075c6a4ba7edeaa2b15233fe1b070a89f070a6d3cadfaef01ac0856946c1f24a527941a99616cb43009293a7fa6814ee41221b00c2074ae016554

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    Filesize

    119KB

    MD5

    98e2bfd9abdfb3a3d2b5ede403268f17

    SHA1

    f8d5fa6b524835efde55e6dd0b478c8bb2dd6a7e

    SHA256

    e777cd79db5c1da310a63f207c0134458e958e3c915ef1582f61a0a4248131fd

    SHA512

    c208f4eb27e075c6a4ba7edeaa2b15233fe1b070a89f070a6d3cadfaef01ac0856946c1f24a527941a99616cb43009293a7fa6814ee41221b00c2074ae016554

  • C:\Users\Admin\AppData\Local\Temp\chrome.exe
    Filesize

    78KB

    MD5

    140c2635f0083c6c50492a05b65f20e8

    SHA1

    212f47d46a0ae777865ee088c858bc5350050412

    SHA256

    bce892d02cc15c25a97be62b1875b5e5d6b0f71e5968b03f5df95d9e8afb4644

    SHA512

    dde4fbab2fd7501f3562cf642972fee880bd123ae133df27ba558018b54f249522a70ebb9020db25227541d2f2c7556066d2b5c36ffd451252cdb43b39256b5b

  • C:\Users\Admin\AppData\Local\Temp\chrome.exe
    Filesize

    78KB

    MD5

    140c2635f0083c6c50492a05b65f20e8

    SHA1

    212f47d46a0ae777865ee088c858bc5350050412

    SHA256

    bce892d02cc15c25a97be62b1875b5e5d6b0f71e5968b03f5df95d9e8afb4644

    SHA512

    dde4fbab2fd7501f3562cf642972fee880bd123ae133df27ba558018b54f249522a70ebb9020db25227541d2f2c7556066d2b5c36ffd451252cdb43b39256b5b

  • C:\Users\Admin\AppData\Local\Temp\njRat Crypter.exe
    Filesize

    15KB

    MD5

    7e50de25c6bdd281c430ec1eefc53598

    SHA1

    945e3424f455bf60f8eb83feb2113718bcbf659f

    SHA256

    84fc46b07098f923bafe63b24fdb194ac85e79728909b6c56a9fad1df065b0e5

    SHA512

    1e2f85acd37a39cb0034121c8537d98f266145c9f60003a028bf08834c50e51481b099dd30e338fffea7675b4a0cea5c558be0795013288f74fa540cab4278c6

  • C:\Users\Admin\AppData\Local\Temp\njRat Crypter.exe
    Filesize

    15KB

    MD5

    7e50de25c6bdd281c430ec1eefc53598

    SHA1

    945e3424f455bf60f8eb83feb2113718bcbf659f

    SHA256

    84fc46b07098f923bafe63b24fdb194ac85e79728909b6c56a9fad1df065b0e5

    SHA512

    1e2f85acd37a39cb0034121c8537d98f266145c9f60003a028bf08834c50e51481b099dd30e338fffea7675b4a0cea5c558be0795013288f74fa540cab4278c6

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    f984d3e8ec96345a66b35a323906bb00

    SHA1

    32e140c40a2df98c2a04f4f431d46ada2eacd614

    SHA256

    b8536b5e5e83eda7d987e942455fe8c7a1bdc82cb9dfa5f6af58f3000bdddd11

    SHA512

    cd98fe870d452ef3670bb729f932edd17fa650f152e57019130cb9e4cf63bed6185dfb5ab444ca6b71a06a806a79e7ca67e4b87358b046052e8d6bbefc30c66f

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    f984d3e8ec96345a66b35a323906bb00

    SHA1

    32e140c40a2df98c2a04f4f431d46ada2eacd614

    SHA256

    b8536b5e5e83eda7d987e942455fe8c7a1bdc82cb9dfa5f6af58f3000bdddd11

    SHA512

    cd98fe870d452ef3670bb729f932edd17fa650f152e57019130cb9e4cf63bed6185dfb5ab444ca6b71a06a806a79e7ca67e4b87358b046052e8d6bbefc30c66f

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\MICROS~1\Office14\BCSSync.exe
    Filesize

    129KB

    MD5

    b1e0da67a985533914394e6b8ac58205

    SHA1

    5a65e6076f592f9ea03af582d19d2407351ba6b6

    SHA256

    67629b025fed676bd607094fa7f21550e18c861495ba664ee0d2b215a4717d7f

    SHA512

    188ebb9a58565ca7ed81a46967a66d583f7dea43a2fc1fe8076a79ef4a83119ccaa22f948a944abae8f64b3a4b219f5184260eff7201eb660c321f6c0d1eba22

  • \Users\Admin\AppData\Local\Temp\3582-490\Server.exe
    Filesize

    78KB

    MD5

    140c2635f0083c6c50492a05b65f20e8

    SHA1

    212f47d46a0ae777865ee088c858bc5350050412

    SHA256

    bce892d02cc15c25a97be62b1875b5e5d6b0f71e5968b03f5df95d9e8afb4644

    SHA512

    dde4fbab2fd7501f3562cf642972fee880bd123ae133df27ba558018b54f249522a70ebb9020db25227541d2f2c7556066d2b5c36ffd451252cdb43b39256b5b

  • \Users\Admin\AppData\Local\Temp\Server.exe
    Filesize

    119KB

    MD5

    98e2bfd9abdfb3a3d2b5ede403268f17

    SHA1

    f8d5fa6b524835efde55e6dd0b478c8bb2dd6a7e

    SHA256

    e777cd79db5c1da310a63f207c0134458e958e3c915ef1582f61a0a4248131fd

    SHA512

    c208f4eb27e075c6a4ba7edeaa2b15233fe1b070a89f070a6d3cadfaef01ac0856946c1f24a527941a99616cb43009293a7fa6814ee41221b00c2074ae016554

  • \Users\Admin\AppData\Local\Temp\Server.exe
    Filesize

    119KB

    MD5

    98e2bfd9abdfb3a3d2b5ede403268f17

    SHA1

    f8d5fa6b524835efde55e6dd0b478c8bb2dd6a7e

    SHA256

    e777cd79db5c1da310a63f207c0134458e958e3c915ef1582f61a0a4248131fd

    SHA512

    c208f4eb27e075c6a4ba7edeaa2b15233fe1b070a89f070a6d3cadfaef01ac0856946c1f24a527941a99616cb43009293a7fa6814ee41221b00c2074ae016554

  • \Users\Admin\AppData\Local\Temp\chrome.exe
    Filesize

    78KB

    MD5

    140c2635f0083c6c50492a05b65f20e8

    SHA1

    212f47d46a0ae777865ee088c858bc5350050412

    SHA256

    bce892d02cc15c25a97be62b1875b5e5d6b0f71e5968b03f5df95d9e8afb4644

    SHA512

    dde4fbab2fd7501f3562cf642972fee880bd123ae133df27ba558018b54f249522a70ebb9020db25227541d2f2c7556066d2b5c36ffd451252cdb43b39256b5b

  • \Users\Admin\AppData\Local\Temp\njRat Crypter.exe
    Filesize

    15KB

    MD5

    7e50de25c6bdd281c430ec1eefc53598

    SHA1

    945e3424f455bf60f8eb83feb2113718bcbf659f

    SHA256

    84fc46b07098f923bafe63b24fdb194ac85e79728909b6c56a9fad1df065b0e5

    SHA512

    1e2f85acd37a39cb0034121c8537d98f266145c9f60003a028bf08834c50e51481b099dd30e338fffea7675b4a0cea5c558be0795013288f74fa540cab4278c6

  • memory/304-54-0x0000000074C91000-0x0000000074C93000-memory.dmp
    Filesize

    8KB

  • memory/812-82-0x0000000073C60000-0x000000007420B000-memory.dmp
    Filesize

    5.7MB

  • memory/812-67-0x0000000000000000-mapping.dmp
  • memory/944-61-0x0000000000000000-mapping.dmp
  • memory/1068-81-0x0000000000000000-mapping.dmp
  • memory/1148-71-0x000007FEF27F0000-0x000007FEF3886000-memory.dmp
    Filesize

    16.6MB

  • memory/1148-56-0x0000000000000000-mapping.dmp
  • memory/1148-65-0x000007FEF3AD0000-0x000007FEF44F3000-memory.dmp
    Filesize

    10.1MB

  • memory/1148-110-0x00000000008D6000-0x00000000008F5000-memory.dmp
    Filesize

    124KB

  • memory/1472-73-0x0000000000000000-mapping.dmp
  • memory/1760-83-0x0000000073C60000-0x000000007420B000-memory.dmp
    Filesize

    5.7MB

  • memory/1760-78-0x0000000000000000-mapping.dmp
  • memory/1760-111-0x0000000073C60000-0x000000007420B000-memory.dmp
    Filesize

    5.7MB