Analysis
-
max time kernel
123s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 08:31
Behavioral task
behavioral1
Sample
2eb8399541a38d7411a8da9ad54603f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2eb8399541a38d7411a8da9ad54603f5.exe
Resource
win10v2004-20231215-en
General
-
Target
2eb8399541a38d7411a8da9ad54603f5.exe
-
Size
93KB
-
MD5
2eb8399541a38d7411a8da9ad54603f5
-
SHA1
35bdd684fe0f9b1b77096e4882d5afb548171f65
-
SHA256
5fc26c8d1ce28ed2277905a966ec30e9f157e14cb19fed06deaeac5500add460
-
SHA512
62397820089f1595fa6a994c33bd19ae5b8163496979e7224db945f559100271e0bbbd6107f386bf0d22b44e88aa42f962eb97b527ce75b68542d52541baf07b
-
SSDEEP
768:ZY3OUnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3ysGZ:NUxOx6baIa9RZj00ljEwzGi1dDuDdgS
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
6.tcp.eu.ngrok.io:10298
1a33d12f87a2ed3cb967309586bdcce8
-
reg_key
1a33d12f87a2ed3cb967309586bdcce8
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2780 netsh.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1a33d12f87a2ed3cb967309586bdcce8Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1a33d12f87a2ed3cb967309586bdcce8Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 2eb8399541a38d7411a8da9ad54603f5.exe 2872 2eb8399541a38d7411a8da9ad54603f5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Explower.exe server.exe File opened for modification C:\Windows\SysWOW64\Explower.exe server.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Explower.exe server.exe File opened for modification C:\Program Files (x86)\Explower.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe 2004 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2004 server.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe Token: 33 2004 server.exe Token: SeIncBasePriorityPrivilege 2004 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2004 2872 2eb8399541a38d7411a8da9ad54603f5.exe 28 PID 2872 wrote to memory of 2004 2872 2eb8399541a38d7411a8da9ad54603f5.exe 28 PID 2872 wrote to memory of 2004 2872 2eb8399541a38d7411a8da9ad54603f5.exe 28 PID 2872 wrote to memory of 2004 2872 2eb8399541a38d7411a8da9ad54603f5.exe 28 PID 2004 wrote to memory of 2780 2004 server.exe 30 PID 2004 wrote to memory of 2780 2004 server.exe 30 PID 2004 wrote to memory of 2780 2004 server.exe 30 PID 2004 wrote to memory of 2780 2004 server.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eb8399541a38d7411a8da9ad54603f5.exe"C:\Users\Admin\AppData\Local\Temp\2eb8399541a38d7411a8da9ad54603f5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD52eb8399541a38d7411a8da9ad54603f5
SHA135bdd684fe0f9b1b77096e4882d5afb548171f65
SHA2565fc26c8d1ce28ed2277905a966ec30e9f157e14cb19fed06deaeac5500add460
SHA51262397820089f1595fa6a994c33bd19ae5b8163496979e7224db945f559100271e0bbbd6107f386bf0d22b44e88aa42f962eb97b527ce75b68542d52541baf07b
-
Filesize
92KB
MD56a2d0a20d4dbea7b0c04a1eaf97a0511
SHA10da9d03e203ad4681673f2c7ed39461c5d9fafa7
SHA25654dc9ce2a33cea75836662bff663c58d9e0783c274894aece42bc084b7101258
SHA512b3fd8ccfdeec0d238a2e26ab70fd71a18ec479b1e9b4e26164f0578c506d6e2f5567b8506a08e3bef5dd5d15ea00daeab20100007035291e2a41265d172104bb