Overview
overview
10Static
static
3Njrat-main...a).exe
windows10-1703-x64
10Njrat-main...a).exe
windows7-x64
7Njrat-main...a).exe
windows10-2004-x64
8Njrat-main...a).exe
windows11-21h2-x64
10Njrat-main...23.exe
windows10-1703-x64
7Njrat-main...23.exe
windows7-x64
7Njrat-main...23.exe
windows10-2004-x64
7Njrat-main...23.exe
windows11-21h2-x64
7Analysis
-
max time kernel
1565s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win11-20240508-en
General
-
Target
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
-
Size
1.7MB
-
MD5
2d3f9951b531061af499f324ca30f3ce
-
SHA1
090626c1013d4e30c182cddc881ef004b7289ede
-
SHA256
7914abca942a21058ca87cf2e19366ce41204fa1085008cb890f5853bc852b2d
-
SHA512
e8ef728be7d9fb55b95b52e0c3e0e87d2a6e560ec5df309878b13c447e349bd2885f5fe1ef4075392bc242523fa7d74aea9607f48194cbc241a39ba04e9b03a5
-
SSDEEP
49152:1UNixUNihxhA3333333333333QthBKthxeGlPAZwX:iiWijhA3333333333333QthIthxlPAZk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
~__UNINST.EXENjRat 0.7D Green Edition by im523.exepid process 2056 ~__UNINST.EXE 2832 NjRat 0.7D Green Edition by im523.exe -
Loads dropped DLL 7 IoCs
Processes:
NjRat 0.7D Green Edition by im523(Beta).exe~__UNINST.EXENjRat 0.7D Green Edition by im523.exepid process 2176 NjRat 0.7D Green Edition by im523(Beta).exe 2056 ~__UNINST.EXE 2056 ~__UNINST.EXE 2056 ~__UNINST.EXE 2056 ~__UNINST.EXE 2832 NjRat 0.7D Green Edition by im523.exe 2832 NjRat 0.7D Green Edition by im523.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
NjRat 0.7D Green Edition by im523.exepid process 2832 NjRat 0.7D Green Edition by im523.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
NjRat 0.7D Green Edition by im523.exepid process 2832 NjRat 0.7D Green Edition by im523.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
NjRat 0.7D Green Edition by im523(Beta).exe~__UNINST.EXEdescription pid process target process PID 2176 wrote to memory of 2056 2176 NjRat 0.7D Green Edition by im523(Beta).exe ~__UNINST.EXE PID 2176 wrote to memory of 2056 2176 NjRat 0.7D Green Edition by im523(Beta).exe ~__UNINST.EXE PID 2176 wrote to memory of 2056 2176 NjRat 0.7D Green Edition by im523(Beta).exe ~__UNINST.EXE PID 2176 wrote to memory of 2056 2176 NjRat 0.7D Green Edition by im523(Beta).exe ~__UNINST.EXE PID 2176 wrote to memory of 2056 2176 NjRat 0.7D Green Edition by im523(Beta).exe ~__UNINST.EXE PID 2176 wrote to memory of 2056 2176 NjRat 0.7D Green Edition by im523(Beta).exe ~__UNINST.EXE PID 2176 wrote to memory of 2056 2176 NjRat 0.7D Green Edition by im523(Beta).exe ~__UNINST.EXE PID 2056 wrote to memory of 2832 2056 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 2056 wrote to memory of 2832 2056 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 2056 wrote to memory of 2832 2056 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 2056 wrote to memory of 2832 2056 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 2056 wrote to memory of 2832 2056 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 2056 wrote to memory of 2832 2056 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 2056 wrote to memory of 2832 2056 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Njrat-main\NjRat 0.7D Green Edition by im523(Beta).exe"C:\Users\Admin\AppData\Local\Temp\Njrat-main\NjRat 0.7D Green Edition by im523(Beta).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE"C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE" C:\Users\Admin\AppData\Local\Temp\Njrat-main\NjRat 0.7D Green Edition by im523(Beta).exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51033c448810d3b507423546432e2f502
SHA12bf9d04f68ed15b957378fb95daa78c85d5b2b26
SHA256f0c85722b88d1e7a1941ba17551cd5c29aef99fad86d78a5631a0f5446b3f580
SHA512aeb964632dfad41fc383a68ace0e6beb152a7075f21a32e449624a27da5d2a5ccda0665fbd90597d65d74b0790877baf6f81336660b1df4bf38b41cd0bc6cd44
-
Filesize
1.7MB
MD52d3f9951b531061af499f324ca30f3ce
SHA1090626c1013d4e30c182cddc881ef004b7289ede
SHA2567914abca942a21058ca87cf2e19366ce41204fa1085008cb890f5853bc852b2d
SHA512e8ef728be7d9fb55b95b52e0c3e0e87d2a6e560ec5df309878b13c447e349bd2885f5fe1ef4075392bc242523fa7d74aea9607f48194cbc241a39ba04e9b03a5