Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2023, 03:13
Behavioral task
behavioral1
Sample
0x000b0000000122e7-60.exe
Resource
win7-20230220-en
General
-
Target
0x000b0000000122e7-60.exe
-
Size
43KB
-
MD5
7bc43f36b07c8b1de174daf7f4ead29b
-
SHA1
700a9e8e4a8a0cd8f7b3b1c58ebf5e47dfa7ec31
-
SHA256
c28550985ad9088407d8149d7d37155c97f10a461581c8a570bb082436596aff
-
SHA512
54169b096eb83782316ea605c391ee70c00099292fdecffff72656989f9eb0ed2d5448f4eb0374d3426c5c7e1d964d2634cd46beedd70aebf7417c28bcdefe8a
-
SSDEEP
384:mZyCdFI1STss7yKSXfuGSOEdrpS2dzsIij+ZsNO3PlpJKkkjh/TzF7pWn6/greTf:8Fduk4smKSvupPrkYuXQ/oD3+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
2.tcp.eu.ngrok.io:19328
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 0x000b0000000122e7-60.exe -
Executes dropped EXE 1 IoCs
pid Process 1332 mrx.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3812 0x000b0000000122e7-60.exe 1332 mrx.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe Token: 33 1332 mrx.exe Token: SeIncBasePriorityPrivilege 1332 mrx.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1332 3812 0x000b0000000122e7-60.exe 84 PID 3812 wrote to memory of 1332 3812 0x000b0000000122e7-60.exe 84 PID 3812 wrote to memory of 1332 3812 0x000b0000000122e7-60.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000b0000000122e7-60.exe"C:\Users\Admin\AppData\Local\Temp\0x000b0000000122e7-60.exe"1⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\mrx.exe"C:\Users\Admin\AppData\Local\Temp\mrx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD57bc43f36b07c8b1de174daf7f4ead29b
SHA1700a9e8e4a8a0cd8f7b3b1c58ebf5e47dfa7ec31
SHA256c28550985ad9088407d8149d7d37155c97f10a461581c8a570bb082436596aff
SHA51254169b096eb83782316ea605c391ee70c00099292fdecffff72656989f9eb0ed2d5448f4eb0374d3426c5c7e1d964d2634cd46beedd70aebf7417c28bcdefe8a
-
Filesize
43KB
MD57bc43f36b07c8b1de174daf7f4ead29b
SHA1700a9e8e4a8a0cd8f7b3b1c58ebf5e47dfa7ec31
SHA256c28550985ad9088407d8149d7d37155c97f10a461581c8a570bb082436596aff
SHA51254169b096eb83782316ea605c391ee70c00099292fdecffff72656989f9eb0ed2d5448f4eb0374d3426c5c7e1d964d2634cd46beedd70aebf7417c28bcdefe8a
-
Filesize
43KB
MD57bc43f36b07c8b1de174daf7f4ead29b
SHA1700a9e8e4a8a0cd8f7b3b1c58ebf5e47dfa7ec31
SHA256c28550985ad9088407d8149d7d37155c97f10a461581c8a570bb082436596aff
SHA51254169b096eb83782316ea605c391ee70c00099292fdecffff72656989f9eb0ed2d5448f4eb0374d3426c5c7e1d964d2634cd46beedd70aebf7417c28bcdefe8a