Analysis
-
max time kernel
1479s -
max time network
1506s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-05-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
NJRAT-main/NJRAT 0.7D/NJRAT 0.7D.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
NJRAT-main/NJRAT 0.7D/NJRAT 0.7D.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
NJRAT-main/NJRAT 0.7D/NJRAT 0.7D.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
NJRAT-main/NJRAT 0.7D/NJRAT 0.7D.exe
Resource
win11-20240508-en
General
-
Target
NJRAT-main/NJRAT 0.7D/NJRAT 0.7D.exe
-
Size
1.8MB
-
MD5
51f09307cf869fd8d38a887e215f68f1
-
SHA1
1e712db1c8e4f85f8a9c3c0df269c33a591eb7de
-
SHA256
ffe4de68cf4b6a1f23bbb4097ad6a29c6a2dbd2f1b609a7b15d38fd8478496ed
-
SHA512
9394a5a852b574666b2ffe6ed0fc075fa40a4d677a89969339450ec1f7784c2d4b8a10e457c0fe325f24bbbd341bfb3149bec65a24bb7241fc688ab473be0aec
-
SSDEEP
49152:5ZB1G8Ycd66Dk7UcGZr8dr9urHhiF4VX5//:r3GKAcVejujhiF0XB/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1672 GeoIP.exe 1140 NJRAT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1948 1672 WerFault.exe 78 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3752 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3752 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 NJRAT.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1140 NJRAT.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1672 2664 NJRAT 0.7D.exe 78 PID 2664 wrote to memory of 1672 2664 NJRAT 0.7D.exe 78 PID 2664 wrote to memory of 1672 2664 NJRAT 0.7D.exe 78 PID 2664 wrote to memory of 1140 2664 NJRAT 0.7D.exe 85 PID 2664 wrote to memory of 1140 2664 NJRAT 0.7D.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NJRAT-main\NJRAT 0.7D\NJRAT 0.7D.exe"C:\Users\Admin\AppData\Local\Temp\NJRAT-main\NJRAT 0.7D\NJRAT 0.7D.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\NJRAT\GeoIP.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\NJRAT\GeoIP.exe" /GeoIP.exe2⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 10203⤵
- Program crash
PID:1948
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\NJRAT\NJRAT.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\NJRAT\NJRAT.exe" /NJRAT.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1672 -ip 16721⤵PID:1868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004C01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5797b96cc417d0cde72e5c25d0898e95e
SHA18c63d0cc8a3a09c1fe50c856b8e5170a63d62f13
SHA2568a0675001b5bc63d8389fc7ed80b4a7b0f9538c744350f00162533519e106426
SHA5129bb0c40c83551000577f8cf0b8a7c344bc105328a2c564df70fabec978ad267fa42e248c11fb78166855b0816d2ef3ec2c12fe52f8cc0b83e366e46301340882
-
Filesize
18KB
MD5016fb288619fb9b7513ecf087cf14535
SHA15699d0cda6add8c96aa21eaab5d0f67b3765acd5
SHA256882289d1bc625d30610d44c9739362d4d340d0c5d9024a24f01c5bd7ed8fde93
SHA51261880ae28966a21f5a26a808f6146cda3e099793ade739cc5b49f3582aa5da0db70c687a89f422a637516d75d674a2f262fdcce51323625e5852967fec433f5d
-
Filesize
1.6MB
MD5473e1a7be89c3a727176d4f9f5a64b69
SHA1501eb2c1432ff2b4e5ff582ad82d0fca152adebc
SHA256bf853789b938bdc5da8aaeb52511379a332c7cf238266a21bfcb0318a62e85cb
SHA5124d0ef049c83fe2790e8c201c643b68be26ae854feaeb154e7b1703c9f7c7250abc7307cef035f723fe8d5cf9d85175ff19a7bd37c403536617c8df9f9a7079fd
-
Filesize
43KB
MD5d4b80052c7b4093e10ce1f40ce74f707
SHA12494a38f1c0d3a0aa9b31cf0650337cacc655697
SHA25659e2ac1b79840274bdfcef412a10058654e42f4285d732d1487e65e60ffbfb46
SHA5123813b81f741ae3adb07ae370e817597ed2803680841ccc7549babb727910c7bff4f8450670d0ca19a0d09e06f133a1aaefecf5b5620e1b0bdb6bcd409982c450
-
Filesize
63KB
MD5a73edb60b80a2dfa86735d821bea7b19
SHA1f39a54d7bc25425578a2b800033e4508714a73ed
SHA2567a4977b024d048b71bcc8f1cc65fb06e4353821323f852dc6740b79b9ab75c98
SHA512283e9206d0b56c1f8b0741375ccd0a184410cf89f5f42dfe91e7438c5fd0ac7fa4afbb84b8b7ea448b3093397552fd3731b9be74c67b846d946da486dcf0df68
-
Filesize
12KB
MD5e747fa3339c1f138b6bfce707b541d03
SHA1b95c54fbd6eb20ba4b4e69736b574baa2699ab8e
SHA2566e31148cc1b3235b71731c3944a7b06f861e104e978708d12c695ec09b5b3760
SHA512b970c3e8bf6a2e3ae920bc8bd014edb86ca92c85a2bccff732c7e5eb2f81ffbd902a34a0a68bd51545954b5f4d6dd1bb84b5c005868c0659717eba2892a67355
-
Filesize
50KB
MD5d4c5ddc00f27162fc0947830e0e762b7
SHA17769be616d752e95d80e167f2ef4cc6b8c3c21fe
SHA256b6fb6b66821e70a27a4750b0cd0393e4ee2603a47feac48d6a3d66d1c1cb56d5
SHA5129555f800213f2f4a857b4558aa4d030edf41485b8366812d5a6b9adcc77fc21584e30d2dd9ce515846f3a809c85038958cb8174bf362cf6fed97ca99a826e379
-
Filesize
28KB
MD50cbc2d9703feead9783439e551c2b673
SHA14f8f4addd6f9e60598a7f4a191a89a52201394a8
SHA256ea9ecf8723788feef6492bf938cdfab1266a1558dffe75e1f78a998320f96e39
SHA51206f55b542000e23f5eeba45ea5ff9ffaddddd102935e039e4496af5e5083f257129dab2f346eeae4ee864f54db57d3c73cf6ed1d3568087411203769cf0ddd66
-
Filesize
39KB
MD5db87daf76c15f3808cec149f639aa64f
SHA1d67f84a44ddc25432ce179aeba9cff778af746ee
SHA256a3e4bee1b6944aa9266bd58de3f534a4c1896df621881a5252a0d355a6e67c70
SHA512ad7dc75254180ff7c988b7f394ad76b696384002457d558469d2c6401dd97cba54c532245bb555ab28d2beda3ab504736bb2b89040a21ba6598929392daab473
-
Filesize
12KB
MD519967e886edcd2f22f8d4a58c8ea3773
SHA1bf6e0e908eaad659fdd32572e9d73c5476ca26ec
SHA2563e5141c75b7746c0eb2b332082a165deacb943cef26bd84668e6b79b47bdfd93
SHA512d471df3f0d69909e8ef9f947da62c77c3ff1eb97ac1dd53a74ad09fb4d74ec26c3c22facc18ec04f26df3b85b0c70863119f5baa090b110ab25383fcdb4e9d6e