Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
548A4036ED72D3479BA73BB16B540198.exe
Resource
win7-20230831-en
General
-
Target
548A4036ED72D3479BA73BB16B540198.exe
-
Size
1.1MB
-
MD5
548a4036ed72d3479ba73bb16b540198
-
SHA1
2f13d78e0a284eee8673aff586582050f72e4f82
-
SHA256
f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
-
SHA512
97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
SSDEEP
24576:7gc2ZZ58NY+7pxrdVzZEUbIBd6U1EtuhgrSiDj2ni:7hFNY+7LdHPI91EagOi
Malware Config
Extracted
njrat
hakim32.ddns.net:2000
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 2544 netsh.exe 1712 netsh.exe 2712 netsh.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beeb0f76ea209c7775b2f9385beb7b67Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beeb0f76ea209c7775b2f9385beb7b67Windows Update.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 server.exe -
Loads dropped DLL 2 IoCs
pid Process 3004 548A4036ED72D3479BA73BB16B540198.exe 3004 548A4036ED72D3479BA73BB16B540198.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 3004 548A4036ED72D3479BA73BB16B540198.exe 3004 548A4036ED72D3479BA73BB16B540198.exe 3004 548A4036ED72D3479BA73BB16B540198.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 548A4036ED72D3479BA73BB16B540198.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe 2684 server.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3004 548A4036ED72D3479BA73BB16B540198.exe 2684 server.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe Token: 33 2684 server.exe Token: SeIncBasePriorityPrivilege 2684 server.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3004 548A4036ED72D3479BA73BB16B540198.exe 2684 server.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2684 3004 548A4036ED72D3479BA73BB16B540198.exe 28 PID 3004 wrote to memory of 2684 3004 548A4036ED72D3479BA73BB16B540198.exe 28 PID 3004 wrote to memory of 2684 3004 548A4036ED72D3479BA73BB16B540198.exe 28 PID 3004 wrote to memory of 2684 3004 548A4036ED72D3479BA73BB16B540198.exe 28 PID 2684 wrote to memory of 2712 2684 server.exe 29 PID 2684 wrote to memory of 2712 2684 server.exe 29 PID 2684 wrote to memory of 2712 2684 server.exe 29 PID 2684 wrote to memory of 2712 2684 server.exe 29 PID 2684 wrote to memory of 1712 2684 server.exe 35 PID 2684 wrote to memory of 1712 2684 server.exe 35 PID 2684 wrote to memory of 1712 2684 server.exe 35 PID 2684 wrote to memory of 1712 2684 server.exe 35 PID 2684 wrote to memory of 2544 2684 server.exe 34 PID 2684 wrote to memory of 2544 2684 server.exe 34 PID 2684 wrote to memory of 2544 2684 server.exe 34 PID 2684 wrote to memory of 2544 2684 server.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe"C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2712
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2544
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies Windows Firewall
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
Filesize
5B
MD502b81b0cbe1faaa1fa62d5fc876ab443
SHA1d473cfe21fb1f188689415b0bdd239688f8fddd9
SHA256e7e9e2c247bc872bacce77661c78f001a17d70ee3130a9016a5818da9da00cdb
SHA512592ab5b200d4c560951cb70288dc1b7a562f0cbfaee01ce03076b6934d537b88575c2e1e0fedcc05db95e6c224ca739923e7d74f9165e683f3fbad7bbf641784
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a
-
Filesize
1.1MB
MD5548a4036ed72d3479ba73bb16b540198
SHA12f13d78e0a284eee8673aff586582050f72e4f82
SHA256f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f
SHA51297b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a