Analysis Overview
SHA256
844f98e5b4a5db82372f1da0317c1a56e39ff5da7d1d9b519a4d3f105ed099c2
Threat Level: Known bad
The file e431cae2c2e7c1d50e2264102d898310.bin was found to be: Known bad.
Malicious Activity Summary
Njrat family
Drops startup file
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-03-02 03:49
Signatures
Njrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-02 03:49
Reported
2024-03-02 03:52
Platform
win7-20240215-en
Max time kernel
150s
Max time network
147s
Command Line
Signatures
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.url | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe\" .." | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe\" .." | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\TASKKILL.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\TASKKILL.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe
"C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe"
C:\Windows\SysWOW64\TASKKILL.exe
TASKKILL /F /IM wscript.exe
C:\Windows\SysWOW64\TASKKILL.exe
TASKKILL /F /IM cmd.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | tcp |
Files
memory/2348-1-0x0000000000560000-0x00000000005A0000-memory.dmp
memory/2348-0-0x0000000074BB0000-0x000000007515B000-memory.dmp
memory/2348-2-0x0000000074BB0000-0x000000007515B000-memory.dmp
memory/2348-17-0x0000000074BB0000-0x000000007515B000-memory.dmp
memory/2348-18-0x0000000000560000-0x00000000005A0000-memory.dmp
memory/2348-19-0x0000000000560000-0x00000000005A0000-memory.dmp
memory/2348-20-0x0000000000560000-0x00000000005A0000-memory.dmp
memory/2348-21-0x0000000000560000-0x00000000005A0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-02 03:49
Reported
2024-03-02 03:52
Platform
win10v2004-20240226-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.url | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe\" .." | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe\" .." | C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
| N/A | 0.tcp.eu.ngrok.io | N/A | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\TASKKILL.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\TASKKILL.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe
"C:\Users\Admin\AppData\Local\Temp\ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f.exe"
C:\Windows\SysWOW64\TASKKILL.exe
TASKKILL /F /IM wscript.exe
C:\Windows\SysWOW64\TASKKILL.exe
TASKKILL /F /IM cmd.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.125.223.134:12607 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 3.124.142.205:12607 | 0.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 0.tcp.eu.ngrok.io | udp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
| DE | 18.158.249.75:12607 | 0.tcp.eu.ngrok.io | tcp |
Files
memory/4812-0-0x0000000074B30000-0x00000000750E1000-memory.dmp
memory/4812-1-0x0000000074B30000-0x00000000750E1000-memory.dmp
memory/4812-2-0x0000000001A50000-0x0000000001A60000-memory.dmp
memory/4812-8-0x0000000074B30000-0x00000000750E1000-memory.dmp
memory/4812-9-0x0000000074B30000-0x00000000750E1000-memory.dmp
memory/4812-11-0x0000000001A50000-0x0000000001A60000-memory.dmp
memory/4812-10-0x0000000001A50000-0x0000000001A60000-memory.dmp
memory/4812-12-0x0000000001A50000-0x0000000001A60000-memory.dmp
memory/4812-13-0x0000000001A50000-0x0000000001A60000-memory.dmp
memory/4812-14-0x0000000001A50000-0x0000000001A60000-memory.dmp
memory/4812-15-0x0000000001A50000-0x0000000001A60000-memory.dmp
memory/4812-16-0x0000000001A50000-0x0000000001A60000-memory.dmp