Analysis
-
max time kernel
32s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
4011c945eab342dfa34f753fb98a8903.exe
Resource
win7-20231215-en
General
-
Target
4011c945eab342dfa34f753fb98a8903.exe
-
Size
65KB
-
MD5
4011c945eab342dfa34f753fb98a8903
-
SHA1
abdf5d45451977d0aa451b34947de4459fe01c2e
-
SHA256
af5fd63b145516de0fe79e709e30099e24f5099d0415c5ecff07b94e5f03ae7b
-
SHA512
fada3b5a3370ac17194f9646e933c4c00735ba5ec30ae6abc7546bcc506d4ddc8474155add6ab6b4faf4963080d51791ecb25c05a677b3c042fa7b980dbc609a
-
SSDEEP
1536:sEikUQ5Ke31oeYUnqmc/5arJpG96UzodEtp6ARiOm6Ozx:sE5rl/Nq9QIz8A8OmRx
Malware Config
Extracted
njrat
0.7d
⋘A♆A⋙
hakim32.ddns.net:2000
a5b3fa3acb0104014f92c69f9ef455a8
-
reg_key
a5b3fa3acb0104014f92c69f9ef455a8
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2292 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 4011c945eab342dfa34f753fb98a8903.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 Manifest Windows.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 4011c945eab342dfa34f753fb98a8903.exe File opened for modification C:\Windows\assembly\Desktop.ini 4011c945eab342dfa34f753fb98a8903.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini 4011c945eab342dfa34f753fb98a8903.exe File opened for modification C:\Windows\assembly 4011c945eab342dfa34f753fb98a8903.exe File created C:\Windows\assembly\Desktop.ini 4011c945eab342dfa34f753fb98a8903.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2692 1872 4011c945eab342dfa34f753fb98a8903.exe 101 PID 1872 wrote to memory of 2692 1872 4011c945eab342dfa34f753fb98a8903.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\4011c945eab342dfa34f753fb98a8903.exe"C:\Users\Admin\AppData\Local\Temp\4011c945eab342dfa34f753fb98a8903.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\ProgramData\Manifest Windows.exe"C:\ProgramData\Manifest Windows.exe"2⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\Manifest Windows.exe" "Manifest Windows.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2292
-
-