Analysis

  • max time kernel
    1s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-01-2024 20:53

General

  • Target

    start.exe

  • Size

    93KB

  • MD5

    eb12259817bf7f95c42d92cb4407a6e0

  • SHA1

    2c138665f5e4ac1c97b6003ecd7850c4a679842d

  • SHA256

    c4b379abbc9f203fc3f04a49eee54d85863132d5b3c4c8f39ebbd01da38849b9

  • SHA512

    5e37b4714ab321c104d9707f45c08b53d9e11bf0e5548218bc02b3087505af7eb01a5aae09f4550006b25e49f52c8ceefb026e45554676494f16074992490b5d

  • SSDEEP

    768:HY3mE7yZnDQMMpAZrGSt6udttXy4slhkGJiXxrjEtCdnl2pi1Rz4Rk3YsGdp9gS7:TE+ZD3rGWNd7yhkhjEwzGi1dDwD9gS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

2.tcp.eu.ngrok.io:13557

Mutex

1390b5de6f068f3d96db87b4801110ec

Attributes
  • reg_key

    1390b5de6f068f3d96db87b4801110ec

  • splitter

    |'|'|

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\start.exe
    "C:\Users\Admin\AppData\Local\Temp\start.exe"
    1⤵
      PID:3612
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        2⤵
          PID:3448
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            3⤵
            • Modifies Windows Firewall
            PID:3264
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
            3⤵
            • Modifies Windows Firewall
            PID:1208
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\server.exe"
            3⤵
              PID:4796
        • C:\Windows\SysWOW64\PING.EXE
          ping 0 -n 2
          1⤵
          • Runs ping.exe
          PID:2264

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          93KB

          MD5

          eb12259817bf7f95c42d92cb4407a6e0

          SHA1

          2c138665f5e4ac1c97b6003ecd7850c4a679842d

          SHA256

          c4b379abbc9f203fc3f04a49eee54d85863132d5b3c4c8f39ebbd01da38849b9

          SHA512

          5e37b4714ab321c104d9707f45c08b53d9e11bf0e5548218bc02b3087505af7eb01a5aae09f4550006b25e49f52c8ceefb026e45554676494f16074992490b5d

        • C:\Users\Admin\AppData\Roaming\app

          Filesize

          4B

          MD5

          c6bdbc9d86009ccf7e8de878c9603213

          SHA1

          2a4b8716f978f2d107bcd8294b486a5ee45afe6e

          SHA256

          36a067fdfcee95eb270f0b72e3b9e40d52c907d749fb9a8490d82f8ee56b29eb

          SHA512

          c42a52cd8837e2533b3d5ec97639f0c94287e3d7a6c73635c21df50eba8483b60df15bf262a308836875cd9afed504e7f98a2f6b254e4181fe548b1853d42256

        • memory/3448-50-0x00000000030E0000-0x00000000030F0000-memory.dmp

          Filesize

          64KB

        • memory/3448-12-0x00000000030E0000-0x00000000030F0000-memory.dmp

          Filesize

          64KB

        • memory/3448-11-0x0000000073330000-0x00000000738E0000-memory.dmp

          Filesize

          5.7MB

        • memory/3448-52-0x00000000030E0000-0x00000000030F0000-memory.dmp

          Filesize

          64KB

        • memory/3448-51-0x0000000073330000-0x00000000738E0000-memory.dmp

          Filesize

          5.7MB

        • memory/3448-53-0x00000000030E0000-0x00000000030F0000-memory.dmp

          Filesize

          64KB

        • memory/3448-56-0x0000000073330000-0x00000000738E0000-memory.dmp

          Filesize

          5.7MB

        • memory/3612-10-0x0000000073330000-0x00000000738E0000-memory.dmp

          Filesize

          5.7MB

        • memory/3612-2-0x0000000073330000-0x00000000738E0000-memory.dmp

          Filesize

          5.7MB

        • memory/3612-0-0x0000000073330000-0x00000000738E0000-memory.dmp

          Filesize

          5.7MB

        • memory/3612-1-0x0000000002DF0000-0x0000000002E00000-memory.dmp

          Filesize

          64KB