Overview
overview
7Static
static
1njRAT 0.7d...on.exe
windows10-2004-x64
1njRAT 0.7d...ip.exe
windows10-2004-x64
7njRAT 0.7d...ck.exe
windows10-2004-x64
1njRAT 0.7d...r1.exe
windows10-2004-x64
1njRAT 0.7d...r2.exe
windows10-2004-x64
1njRAT 0.7d...r3.exe
windows10-2004-x64
1njRAT 0.7d...r4.exe
windows10-2004-x64
1njRAT 0.7d...r5.exe
windows10-2004-x64
1njRAT 0.7d...r6.exe
windows10-2004-x64
1njRAT 0.7d...am.dll
windows10-2004-x64
1njRAT 0.7d...ch.dll
windows10-2004-x64
1njRAT 0.7d...un.exe
windows10-2004-x64
1njRAT 0.7d...ic.dll
windows10-2004-x64
1njRAT 0.7d...lg.dll
windows10-2004-x64
1njRAT 0.7d...pw.dll
windows10-2004-x64
1njRAT 0.7d...c2.dll
windows10-2004-x64
1njRAT 0.7d...in.xml
windows10-2004-x64
1njRAT 0.7d...ub.xml
windows10-2004-x64
1njRAT 0.7d...et.dll
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
njRAT 0.7d Horror Edition/NjRat 0.7D Horror Edition.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
njRAT 0.7d Horror Edition/Plugin/Clip.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
njRAT 0.7d Horror Edition/Plugin/Lock.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
njRAT 0.7d Horror Edition/Plugin/Screamer1.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
njRAT 0.7d Horror Edition/Plugin/Screamer2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
njRAT 0.7d Horror Edition/Plugin/Screamer3.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
njRAT 0.7d Horror Edition/Plugin/Screamer4.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
njRAT 0.7d Horror Edition/Plugin/Screamer5.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
njRAT 0.7d Horror Edition/Plugin/Screamer6.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral10
Sample
njRAT 0.7d Horror Edition/Plugin/cam.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
njRAT 0.7d Horror Edition/Plugin/ch.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
njRAT 0.7d Horror Edition/Plugin/fun.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
njRAT 0.7d Horror Edition/Plugin/mic.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
njRAT 0.7d Horror Edition/Plugin/plg.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
njRAT 0.7d Horror Edition/Plugin/pw.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
njRAT 0.7d Horror Edition/Plugin/sc2.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral17
Sample
njRAT 0.7d Horror Edition/Stub/Admin.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
njRAT 0.7d Horror Edition/Stub/Stub.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
njRAT 0.7d Horror Edition/WinMM.Net.dll
Resource
win10v2004-20230220-en
General
-
Target
njRAT 0.7d Horror Edition/Plugin/Clip.exe
-
Size
13KB
-
MD5
fd829592c5abc1361c2f5e81b2678019
-
SHA1
91b6d23bc43332bb7fee1b2d924a5c26a86747e4
-
SHA256
88b7a47f63f149d273015f4f6ce9ef8c5a731b6cf19db7a95220298603000b8c
-
SHA512
4e3e3b3cbfc2c25ac23399d15dcb6e7b40e5572fe9e5e741152f20589cd94de390fe0bea4abfb53ff427c6dec366d41a43a3a67ccdbb34c139f781be0b6b6c34
-
SSDEEP
384:Gr+hl2K2kTjnbkHWUWb1Lc4WrYk90/RxLKNrw:GrYSWUWbJ5//KNrw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Clip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1660 4988 Clip.exe 85 PID 4988 wrote to memory of 1660 4988 Clip.exe 85 PID 1660 wrote to memory of 4104 1660 cmd.exe 87 PID 1660 wrote to memory of 4104 1660 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\njRAT 0.7d Horror Edition\Plugin\Clip.exe"C:\Users\Admin\AppData\Local\Temp\njRAT 0.7d Horror Edition\Plugin\Clip.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del C:\Users\Admin\AppData\Local\Temp\njRAT 0.7d Horror Edition\Plugin\Clip.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:4104
-
-