Analysis

  • max time kernel
    1s
  • max time network
    32s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-01-2024 18:58

General

  • Target

    start.exe

  • Size

    93KB

  • MD5

    a2678bbd0eace916ffeb692085da3ce3

  • SHA1

    4962672978e14a77eddc7992296faa88f68cfc0e

  • SHA256

    0d1e495ca174082e5f51835d1fab22a9a664e83dd06cbd6670617cbb1c30a456

  • SHA512

    8f773d8bf5389953d886074f9da65e7114479d05e63f1f60da66db89381e06d5c9e8780d03131d89ffe01c1be5daf5c020fa201ded7048d70c15f9261752d861

  • SSDEEP

    1536:cuNBNvGfr2p4dTT/hDjEwzGi1dDKDkgS:cuYfr2p4dP/Gi1dkd

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

dead-reviewer.gl.at.ply.gg:60161

Mutex

90319c19387bbc36810cf2f727f01c05

Attributes
  • reg_key

    90319c19387bbc36810cf2f727f01c05

  • splitter

    |'|'|

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\start.exe
    "C:\Users\Admin\AppData\Local\Temp\start.exe"
    1⤵
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        2⤵
          PID:1912
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            3⤵
            • Modifies Windows Firewall
            PID:828

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        93KB

        MD5

        a2678bbd0eace916ffeb692085da3ce3

        SHA1

        4962672978e14a77eddc7992296faa88f68cfc0e

        SHA256

        0d1e495ca174082e5f51835d1fab22a9a664e83dd06cbd6670617cbb1c30a456

        SHA512

        8f773d8bf5389953d886074f9da65e7114479d05e63f1f60da66db89381e06d5c9e8780d03131d89ffe01c1be5daf5c020fa201ded7048d70c15f9261752d861

      • C:\Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        92KB

        MD5

        d6bde443efc13a292cd4f11ca451e30c

        SHA1

        64a0c22463036380b99999f7eb14cc6529d75227

        SHA256

        75d890ea638358087ab3cab5e28273a2ea1bd6c15032e21bde15bf3d5dfa2906

        SHA512

        05ee5f1b00d34f6e10e472ff4185487ce35f9919a1248724e8af7af676abbfec19d67a66c3e262e37cefefe5633fca87e99a727371aa3b0219a8c79af5e00dda

      • memory/1912-12-0x0000000003160000-0x0000000003170000-memory.dmp

        Filesize

        64KB

      • memory/1912-11-0x0000000073590000-0x0000000073B40000-memory.dmp

        Filesize

        5.7MB

      • memory/1912-47-0x0000000003160000-0x0000000003170000-memory.dmp

        Filesize

        64KB

      • memory/1912-46-0x0000000073590000-0x0000000073B40000-memory.dmp

        Filesize

        5.7MB

      • memory/2676-0-0x0000000073590000-0x0000000073B40000-memory.dmp

        Filesize

        5.7MB

      • memory/2676-2-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

        Filesize

        64KB

      • memory/2676-1-0x0000000073590000-0x0000000073B40000-memory.dmp

        Filesize

        5.7MB

      • memory/2676-10-0x0000000073590000-0x0000000073B40000-memory.dmp

        Filesize

        5.7MB