Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2024 04:56

General

  • Target

    384283583fa482e95a7c30f81b6f3270f7cae4307804943de91bbd728d6c73a5.exe

  • Size

    1.1MB

  • MD5

    7467ecc03872d65fe8d417967e495cd5

  • SHA1

    c2d13479568363882878cf02b5996feab32ad5b9

  • SHA256

    384283583fa482e95a7c30f81b6f3270f7cae4307804943de91bbd728d6c73a5

  • SHA512

    4e0a76209ca8249f813f1fdb07438eb04a8e64783c34103d63abd91bc0e7584f3df640dca7982244e939c0b0c223fd3420a9e946c5bc0fa5e25c4fc66ec2152a

  • SSDEEP

    24576:1EkcnmDweOrhcpd8xC/VaKEOq/s88sssss8ssPsssssssd:1E9mDB2hs8gAK0/s88sssss8ssPssssk

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

seznam.zapto.org:5050

Mutex

251577ddb354

Attributes
  • reg_key

    251577ddb354

  • splitter

    @!#&^%$

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\384283583fa482e95a7c30f81b6f3270f7cae4307804943de91bbd728d6c73a5.exe
    "C:\Users\Admin\AppData\Local\Temp\384283583fa482e95a7c30f81b6f3270f7cae4307804943de91bbd728d6c73a5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-0-0x0000000000450000-0x000000000056C000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-1-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/1424-2-0x0000000004EF0000-0x0000000004F8C000-memory.dmp

    Filesize

    624KB

  • memory/1424-3-0x0000000002980000-0x000000000298C000-memory.dmp

    Filesize

    48KB

  • memory/1424-4-0x0000000033730000-0x0000000033CD4000-memory.dmp

    Filesize

    5.6MB

  • memory/1424-5-0x0000000005250000-0x0000000005260000-memory.dmp

    Filesize

    64KB

  • memory/1424-6-0x0000000005110000-0x00000000051A2000-memory.dmp

    Filesize

    584KB

  • memory/1424-7-0x00000000050C0000-0x00000000050CA000-memory.dmp

    Filesize

    40KB

  • memory/1424-8-0x0000000005450000-0x00000000054B6000-memory.dmp

    Filesize

    408KB

  • memory/1424-9-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/1424-10-0x0000000005250000-0x0000000005260000-memory.dmp

    Filesize

    64KB