Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 13:21
Behavioral task
behavioral1
Sample
1660-14-0x0000000000610000-0x0000000000650000-memory.exe
Resource
win7-20230712-en
General
-
Target
1660-14-0x0000000000610000-0x0000000000650000-memory.exe
-
Size
256KB
-
MD5
df354d41cb9eeb6064629f54aa243450
-
SHA1
b6056d4453385349d020fcf447bf19fccc800570
-
SHA256
2b44054c257780f0297d3a39d48a8fddbd2a2c6e047b4d25dcbb33fdaf0cd7b7
-
SHA512
5e3460ab89943032670eef6478587607a9658b1548b2a5596955b1209df452ac3795c35002c735fc16c441a11d01efecbcb42234cf29da46fc5750c788943ed3
-
SSDEEP
1536:zvKO+4jwQVkLjMvBngxp0ICzoWdLGCQIXI1wEBn2a3pb4rw2UlvLf:99wTLagxp0IqoqnI1wg9Gr/Ut
Malware Config
Extracted
njrat
0.7d
system
147.50.253.241:6522
e4d8b898672502b9751c26f7a748bd76
-
reg_key
e4d8b898672502b9751c26f7a748bd76
-
splitter
Y262SUCZ4UJJ
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 1 IoCs
Processes:
system.exepid process 2204 system.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
system.exedescription pid process Token: SeDebugPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe Token: 33 2204 system.exe Token: SeIncBasePriorityPrivilege 2204 system.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1660-14-0x0000000000610000-0x0000000000650000-memory.exesystem.exedescription pid process target process PID 1712 wrote to memory of 2204 1712 1660-14-0x0000000000610000-0x0000000000650000-memory.exe system.exe PID 1712 wrote to memory of 2204 1712 1660-14-0x0000000000610000-0x0000000000650000-memory.exe system.exe PID 1712 wrote to memory of 2204 1712 1660-14-0x0000000000610000-0x0000000000650000-memory.exe system.exe PID 2204 wrote to memory of 2508 2204 system.exe netsh.exe PID 2204 wrote to memory of 2508 2204 system.exe netsh.exe PID 2204 wrote to memory of 2508 2204 system.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1660-14-0x0000000000610000-0x0000000000650000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1660-14-0x0000000000610000-0x0000000000650000-memory.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\system.exe" "system.exe" ENABLE3⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\system.exeFilesize
256KB
MD5df354d41cb9eeb6064629f54aa243450
SHA1b6056d4453385349d020fcf447bf19fccc800570
SHA2562b44054c257780f0297d3a39d48a8fddbd2a2c6e047b4d25dcbb33fdaf0cd7b7
SHA5125e3460ab89943032670eef6478587607a9658b1548b2a5596955b1209df452ac3795c35002c735fc16c441a11d01efecbcb42234cf29da46fc5750c788943ed3
-
C:\Users\Admin\AppData\Local\Temp\system.exeFilesize
256KB
MD5df354d41cb9eeb6064629f54aa243450
SHA1b6056d4453385349d020fcf447bf19fccc800570
SHA2562b44054c257780f0297d3a39d48a8fddbd2a2c6e047b4d25dcbb33fdaf0cd7b7
SHA5125e3460ab89943032670eef6478587607a9658b1548b2a5596955b1209df452ac3795c35002c735fc16c441a11d01efecbcb42234cf29da46fc5750c788943ed3
-
C:\Users\Admin\AppData\Local\Temp\system.exeFilesize
256KB
MD5df354d41cb9eeb6064629f54aa243450
SHA1b6056d4453385349d020fcf447bf19fccc800570
SHA2562b44054c257780f0297d3a39d48a8fddbd2a2c6e047b4d25dcbb33fdaf0cd7b7
SHA5125e3460ab89943032670eef6478587607a9658b1548b2a5596955b1209df452ac3795c35002c735fc16c441a11d01efecbcb42234cf29da46fc5750c788943ed3
-
memory/1712-0-0x0000000075080000-0x0000000075631000-memory.dmpFilesize
5.7MB
-
memory/1712-1-0x0000000075080000-0x0000000075631000-memory.dmpFilesize
5.7MB
-
memory/1712-2-0x0000000001520000-0x0000000001530000-memory.dmpFilesize
64KB
-
memory/1712-12-0x0000000075080000-0x0000000075631000-memory.dmpFilesize
5.7MB
-
memory/2204-13-0x0000000075080000-0x0000000075631000-memory.dmpFilesize
5.7MB
-
memory/2204-14-0x00000000009C0000-0x00000000009D0000-memory.dmpFilesize
64KB
-
memory/2204-15-0x0000000075080000-0x0000000075631000-memory.dmpFilesize
5.7MB
-
memory/2204-16-0x0000000075080000-0x0000000075631000-memory.dmpFilesize
5.7MB
-
memory/2204-17-0x00000000009C0000-0x00000000009D0000-memory.dmpFilesize
64KB