Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 18:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dfcb89871609972a7830baf6b6840ff7.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
dfcb89871609972a7830baf6b6840ff7.exe
-
Size
40KB
-
MD5
dfcb89871609972a7830baf6b6840ff7
-
SHA1
52e882a338155be96b05bdbd3ea269ae050379ca
-
SHA256
c4950c74045abebe52917b078a5b404412468c55eb3f6832ed1079c52ddcd206
-
SHA512
eecf0f0026e07436c07a2efec5aee3af9e67897a475bccd85b53e230e510de99ed7acfee0b4aa704bd2027f019b27cbe8a16cc26017c90d9cbda2d3aa54f1be3
-
SSDEEP
384:/TEw7bFh99DtgjqLkJnYSaDr3DwyXYkX:/rzK+LmebHx
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
jaja
C2
127.0.0.1:442
Mutex
74caf6ac20895d0081b0f902a5e18339
Attributes
-
reg_key
74caf6ac20895d0081b0f902a5e18339
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4712 netsh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 908 set thread context of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe Token: 33 2988 aspnet_compiler.exe Token: SeIncBasePriorityPrivilege 2988 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 908 dfcb89871609972a7830baf6b6840ff7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 908 wrote to memory of 2988 908 dfcb89871609972a7830baf6b6840ff7.exe 96 PID 2988 wrote to memory of 4712 2988 aspnet_compiler.exe 99 PID 2988 wrote to memory of 4712 2988 aspnet_compiler.exe 99 PID 2988 wrote to memory of 4712 2988 aspnet_compiler.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfcb89871609972a7830baf6b6840ff7.exe"C:\Users\Admin\AppData\Local\Temp\dfcb89871609972a7830baf6b6840ff7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe" "aspnet_compiler.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4712
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:3628