Analysis
-
max time kernel
30s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 18:26
Behavioral task
behavioral1
Sample
557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe
Resource
win7-20230712-en
General
-
Target
557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe
-
Size
43KB
-
MD5
aa91557978aa60bc7bf9d84471e119d4
-
SHA1
b7dd12b6219cc1157c91c1afc913b138cc170b66
-
SHA256
557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28d
-
SHA512
8a8971c7f0211de2b41eaacf4f2d397a7ab617f7e5f76acd5b49b160952d92e92cf3537d604b939b1cc4b4dcb07e2c102b00f98d76083f435e022d87064dca55
-
SSDEEP
384:yZyzSg98NaIyrLPb3cWESES6ik7azsIij+ZsNO3PlpJKkkjh/TzF7pWnk/greT0k:A4ywFrzb3cP7QuXQ/oh/+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
4.tcp.eu.ngrok.io:11176
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4964 Server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4716 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2956 557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2956 557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe Token: 33 2956 557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe Token: SeIncBasePriorityPrivilege 2956 557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4716 2956 557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe 90 PID 2956 wrote to memory of 4716 2956 557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe 90 PID 2956 wrote to memory of 4716 2956 557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28dexe_JC.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Creates scheduled task(s)
PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe1⤵
- Executes dropped EXE
PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5aa91557978aa60bc7bf9d84471e119d4
SHA1b7dd12b6219cc1157c91c1afc913b138cc170b66
SHA256557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28d
SHA5128a8971c7f0211de2b41eaacf4f2d397a7ab617f7e5f76acd5b49b160952d92e92cf3537d604b939b1cc4b4dcb07e2c102b00f98d76083f435e022d87064dca55
-
Filesize
43KB
MD5aa91557978aa60bc7bf9d84471e119d4
SHA1b7dd12b6219cc1157c91c1afc913b138cc170b66
SHA256557f48ca00803c41434f3e01286839df2c69253244b5e67bd16b02c260a4a28d
SHA5128a8971c7f0211de2b41eaacf4f2d397a7ab617f7e5f76acd5b49b160952d92e92cf3537d604b939b1cc4b4dcb07e2c102b00f98d76083f435e022d87064dca55