Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 12:18
Behavioral task
behavioral1
Sample
5b99e96e08af83ea3c1fe4778d5e2f8a.exe
Resource
win7-20230712-en
4 signatures
150 seconds
General
-
Target
5b99e96e08af83ea3c1fe4778d5e2f8a.exe
-
Size
43KB
-
MD5
5b99e96e08af83ea3c1fe4778d5e2f8a
-
SHA1
1bc510bae144be38293e2b3901bee566dde8c124
-
SHA256
dafc057aeed8cfc248678ef196f75f2325aa653ae94ebbff3ddb98b1aeb90848
-
SHA512
3e779a4af6ca50339b1de4d6cd12876647d42b9ee4a04ca094f23d77fcac01bb93feb51605097e2a1a3197c7c257149c48c477aa3c5a2b8d497609e2d0f297c9
-
SSDEEP
384:PZybRy1STss7yKSVBuYYkEhxpS2/zsIij+ZsNO3PlpJKkkjh/TzF7pWnwDgreT0k:xMwk4smKSnuhlxkmuXQ/olT+L
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
???
C2
0.tcp.eu.ngrok.io:19067
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
5b99e96e08af83ea3c1fe4778d5e2f8a.exepid process 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
5b99e96e08af83ea3c1fe4778d5e2f8a.exedescription pid process Token: SeDebugPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: 33 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe Token: SeIncBasePriorityPrivilege 2940 5b99e96e08af83ea3c1fe4778d5e2f8a.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2940-0-0x0000000075350000-0x0000000075B00000-memory.dmpFilesize
7.7MB
-
memory/2940-1-0x0000000000090000-0x00000000000A2000-memory.dmpFilesize
72KB
-
memory/2940-2-0x0000000004AF0000-0x0000000004B8C000-memory.dmpFilesize
624KB
-
memory/2940-3-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/2940-4-0x00000000053C0000-0x0000000005964000-memory.dmpFilesize
5.6MB
-
memory/2940-5-0x0000000004EB0000-0x0000000004F42000-memory.dmpFilesize
584KB
-
memory/2940-6-0x0000000004A90000-0x0000000004A9A000-memory.dmpFilesize
40KB
-
memory/2940-7-0x0000000005100000-0x0000000005166000-memory.dmpFilesize
408KB
-
memory/2940-8-0x0000000075350000-0x0000000075B00000-memory.dmpFilesize
7.7MB
-
memory/2940-9-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB