Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe
Resource
win10v2004-20240226-en
General
-
Target
a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe
-
Size
61KB
-
MD5
944c114e02b1d7fdc46e0b495cfc01c3
-
SHA1
0b810447828a36ce22d905c0a5ca8ce6f38700ba
-
SHA256
a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2
-
SHA512
c5c30fdd8d2dbda2cfa1a10d56d7a7485cd0d565e49542fa6f9dd9c05ce2606feaef4855656ceab4e8f3bb60dd13f4fc564e6566ec23dcec8d8aca8d6b2d071c
-
SSDEEP
1536:6weoCsTr2cg+H32CP4Gr+D12uYew4spdA4GSuw1:l2R+RED1IKedv
Malware Config
Extracted
njrat
0.7d
@ HaCkInG By Dr WeSt @
w187.ddns.net:2020
4ef9538b5a577a1bd3c1a578ea50c133
-
reg_key
4ef9538b5a577a1bd3c1a578ea50c133
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2116 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe[Mr.Abu Hani].exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation [Mr.Abu Hani].exe -
Drops startup file 2 IoCs
Processes:
Windows Audio Device Graph Isolation .exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4ef9538b5a577a1bd3c1a578ea50c133.exe Windows Audio Device Graph Isolation .exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4ef9538b5a577a1bd3c1a578ea50c133.exe Windows Audio Device Graph Isolation .exe -
Executes dropped EXE 2 IoCs
Processes:
[Mr.Abu Hani].exeWindows Audio Device Graph Isolation .exepid process 4848 [Mr.Abu Hani].exe 4064 Windows Audio Device Graph Isolation .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
Windows Audio Device Graph Isolation .exedescription pid process Token: SeDebugPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe Token: 33 4064 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 4064 Windows Audio Device Graph Isolation .exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe[Mr.Abu Hani].exeWindows Audio Device Graph Isolation .exedescription pid process target process PID 4944 wrote to memory of 4848 4944 a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe [Mr.Abu Hani].exe PID 4944 wrote to memory of 4848 4944 a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe [Mr.Abu Hani].exe PID 4944 wrote to memory of 4848 4944 a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe [Mr.Abu Hani].exe PID 4848 wrote to memory of 4064 4848 [Mr.Abu Hani].exe Windows Audio Device Graph Isolation .exe PID 4848 wrote to memory of 4064 4848 [Mr.Abu Hani].exe Windows Audio Device Graph Isolation .exe PID 4848 wrote to memory of 4064 4848 [Mr.Abu Hani].exe Windows Audio Device Graph Isolation .exe PID 4064 wrote to memory of 2116 4064 Windows Audio Device Graph Isolation .exe netsh.exe PID 4064 wrote to memory of 2116 4064 Windows Audio Device Graph Isolation .exe netsh.exe PID 4064 wrote to memory of 2116 4064 Windows Audio Device Graph Isolation .exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe"C:\Users\Admin\AppData\Local\Temp\a4f78e77907d8ea06d93912ebc29d191629c47270d87882ed9e8948a3bbb77c2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\[Mr.Abu Hani].exe"C:\Users\Admin\AppData\Local\Temp\[Mr.Abu Hani].exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Windows Audio Device Graph Isolation .exe"C:\Users\Admin\AppData\Roaming\Windows Audio Device Graph Isolation .exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Windows Audio Device Graph Isolation .exe" "Windows Audio Device Graph Isolation .exe" ENABLE4⤵
- Modifies Windows Firewall
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[Mr.Abu Hani].exeFilesize
23KB
MD51b6071dc1c6ca35c780dc5dcf5392ba3
SHA1c331def6c09f8c82bc71826b9df035e8fcc5059d
SHA25689a5182594c48407f4588d196d1a22dbed83f4a01023a9e5f6730f5b318ff721
SHA5127b5d03b817025b423d0331a73bd32bb5ec2b5a6fa16bbf40c58695ee193c7dad66187b1574cadd59259799a6c80eabe4031e7d2ea9b22c9333c772d6e4b47c56
-
memory/4064-29-0x00000000010E0000-0x00000000010F0000-memory.dmpFilesize
64KB
-
memory/4064-33-0x00000000010E0000-0x00000000010F0000-memory.dmpFilesize
64KB
-
memory/4064-32-0x00000000711A0000-0x0000000071751000-memory.dmpFilesize
5.7MB
-
memory/4064-30-0x00000000711A0000-0x0000000071751000-memory.dmpFilesize
5.7MB
-
memory/4064-28-0x00000000711A0000-0x0000000071751000-memory.dmpFilesize
5.7MB
-
memory/4848-27-0x00000000711A0000-0x0000000071751000-memory.dmpFilesize
5.7MB
-
memory/4848-16-0x00000000711A0000-0x0000000071751000-memory.dmpFilesize
5.7MB
-
memory/4848-17-0x0000000001180000-0x0000000001190000-memory.dmpFilesize
64KB
-
memory/4848-15-0x00000000711A0000-0x0000000071751000-memory.dmpFilesize
5.7MB
-
memory/4944-0-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/4944-14-0x0000000075210000-0x00000000759C0000-memory.dmpFilesize
7.7MB
-
memory/4944-3-0x0000000004A20000-0x0000000004A30000-memory.dmpFilesize
64KB
-
memory/4944-2-0x0000000004A30000-0x0000000004FD4000-memory.dmpFilesize
5.6MB
-
memory/4944-1-0x0000000075210000-0x00000000759C0000-memory.dmpFilesize
7.7MB