Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/09/2023, 14:42
Behavioral task
behavioral1
Sample
0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe
Resource
win7-20230831-en
3 signatures
150 seconds
General
-
Target
0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe
-
Size
43KB
-
MD5
e07a766fd4c6edf95b883c188b4e50d5
-
SHA1
537bbc237ca18309ce4c2b51fd25fce94b408643
-
SHA256
0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e
-
SHA512
9e3ef01ed2479b51e3ee52e4a62817bc5ab77f5daad568833548f768b9ff1988f2897bd21244235e9072b1669beccc9886328d20bb20866d38d93181cf76b68a
-
SSDEEP
384:/Zy+Hl9n1iDcsyEqt3ptKwQsElGhOEazcIij+ZsNO3PlpJKkkjh/TzF7pWn5mgra:B99nU4pEqt5tKhohuuXQ/o8C+L
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
HacKed
C2
127.0.0.1:5552
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: 33 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe Token: SeIncBasePriorityPrivilege 1712 0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe"C:\Users\Admin\AppData\Local\Temp\0676ff2c691ee8f0e4c8a746a2604bb5373d1984d1a10c6facb1cb2cc800d24e.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1712