Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 10:39
Behavioral task
behavioral1
Sample
64e03ce9d4db10ad22af9fdecf8e750b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
64e03ce9d4db10ad22af9fdecf8e750b.exe
Resource
win10v2004-20231215-en
General
-
Target
64e03ce9d4db10ad22af9fdecf8e750b.exe
-
Size
230KB
-
MD5
64e03ce9d4db10ad22af9fdecf8e750b
-
SHA1
b9fe3564b39f85feac38877320562d345fa31300
-
SHA256
e9cafe0e597dea98a327b31ceb7bcf8a6a90c90d729b6709c0b8819efb53ceec
-
SHA512
815d7f97eb088e3dee422b1fdf7ad9fae6796ad1d7648c46942610d48074042d7d6ea2073ca6d65df86d91b6b8e16c5d03d90a042272c5ea74783f3e62c69ec1
-
SSDEEP
1536:e/gDBnYi9bV1BZV0CbD/csMunng0P5JkcrOGEoUjMJC:e4ZYi9bV1BZV0C3csjnbJkoVBUg8
Malware Config
Extracted
njrat
v2.0
HacKed
79.224.89.201:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 64e03ce9d4db10ad22af9fdecf8e750b.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 64e03ce9d4db10ad22af9fdecf8e750b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 Payload.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" 64e03ce9d4db10ad22af9fdecf8e750b.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe Token: 33 2272 Payload.exe Token: SeIncBasePriorityPrivilege 2272 Payload.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2272 1500 64e03ce9d4db10ad22af9fdecf8e750b.exe 99 PID 1500 wrote to memory of 2272 1500 64e03ce9d4db10ad22af9fdecf8e750b.exe 99 PID 1500 wrote to memory of 2272 1500 64e03ce9d4db10ad22af9fdecf8e750b.exe 99 PID 1500 wrote to memory of 3248 1500 64e03ce9d4db10ad22af9fdecf8e750b.exe 101 PID 1500 wrote to memory of 3248 1500 64e03ce9d4db10ad22af9fdecf8e750b.exe 101 PID 1500 wrote to memory of 3248 1500 64e03ce9d4db10ad22af9fdecf8e750b.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3248 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e03ce9d4db10ad22af9fdecf8e750b.exe"C:\Users\Admin\AppData\Local\Temp\64e03ce9d4db10ad22af9fdecf8e750b.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Views/modifies file attributes
PID:3248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD568b3d2c03ac17264282cd7f4a675f4c7
SHA1d494d51a59e1c18836d5d6fc2b19ee98fa919cf8
SHA256ad03e2931c0c11f22535eb33c6b265164effd92cb39fda1820eddfaa61158c3e
SHA51237df63b61656c43ea905f851f9ccaf26b75f87249ffc05ad68d94715de61bee184764c4047bddd491e9c1bb41b978441617918a9be0882d5f0c953e615c4a049
-
Filesize
57KB
MD51142d08b49b6c3f66a2f1460bb084fa8
SHA11e03bf6321deb05c8a1b07f16a42df26923e8553
SHA256d2ae12ba45a0dbf077cbf69b0289ddfaa133e24761b821d4822298e178f1d1c4
SHA5129f162dcd7c1c3eab8e4842e5033987d89a22542dd999ee67334a4d531609d54111d35c73b44e6ea29a099ab13a7ed88f855168530e274dbcfcb2774ec092479d
-
Filesize
92KB
MD5ca1e7c8ab5b1d897214a4124cc15508d
SHA14a1d0cfb83062a6279d98071ed4d8d533f08b875
SHA256948421805b3eab8614f969550954e1b4f54cc9e208126a4c01a3768af0500cda
SHA512b05af9e205e875a03353e12f590c4110a9e14af43844552b5261c6af7c71833fb510a2baf049d06a225886f7e5b48493ab91eea9872affe61e1d3438ec9076c0