Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 14:31

General

  • Target

    7467ECC03872D65FE8D417967E495CD5.exe

  • Size

    1.1MB

  • MD5

    7467ecc03872d65fe8d417967e495cd5

  • SHA1

    c2d13479568363882878cf02b5996feab32ad5b9

  • SHA256

    384283583fa482e95a7c30f81b6f3270f7cae4307804943de91bbd728d6c73a5

  • SHA512

    4e0a76209ca8249f813f1fdb07438eb04a8e64783c34103d63abd91bc0e7584f3df640dca7982244e939c0b0c223fd3420a9e946c5bc0fa5e25c4fc66ec2152a

  • SSDEEP

    24576:1EkcnmDweOrhcpd8xC/VaKEOq/s88sssss8ssPsssssssd:1E9mDB2hs8gAK0/s88sssss8ssPssssk

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

seznam.zapto.org:5050

Mutex

251577ddb354

Attributes
  • reg_key

    251577ddb354

  • splitter

    @!#&^%$

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7467ECC03872D65FE8D417967E495CD5.exe
    "C:\Users\Admin\AppData\Local\Temp\7467ECC03872D65FE8D417967E495CD5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5064-0-0x0000000000890000-0x00000000009AC000-memory.dmp

    Filesize

    1.1MB

  • memory/5064-1-0x0000000074780000-0x0000000074F30000-memory.dmp

    Filesize

    7.7MB

  • memory/5064-2-0x0000000005270000-0x000000000530C000-memory.dmp

    Filesize

    624KB

  • memory/5064-3-0x0000000002C30000-0x0000000002C3C000-memory.dmp

    Filesize

    48KB

  • memory/5064-4-0x00000000337E0000-0x0000000033D84000-memory.dmp

    Filesize

    5.6MB

  • memory/5064-5-0x0000000005250000-0x0000000005260000-memory.dmp

    Filesize

    64KB

  • memory/5064-6-0x0000000005540000-0x00000000055D2000-memory.dmp

    Filesize

    584KB

  • memory/5064-7-0x00000000053D0000-0x00000000053DA000-memory.dmp

    Filesize

    40KB

  • memory/5064-8-0x0000000005750000-0x00000000057B6000-memory.dmp

    Filesize

    408KB

  • memory/5064-9-0x0000000074780000-0x0000000074F30000-memory.dmp

    Filesize

    7.7MB

  • memory/5064-10-0x0000000005250000-0x0000000005260000-memory.dmp

    Filesize

    64KB