Overview
overview
10Static
static
3Njrat-main...a).exe
windows10-1703-x64
10Njrat-main...a).exe
windows7-x64
7Njrat-main...a).exe
windows10-2004-x64
8Njrat-main...a).exe
windows11-21h2-x64
10Njrat-main...23.exe
windows10-1703-x64
7Njrat-main...23.exe
windows7-x64
7Njrat-main...23.exe
windows10-2004-x64
7Njrat-main...23.exe
windows11-21h2-x64
7Analysis
-
max time kernel
1563s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Njrat-main/NjRat 0.7D Green Edition by im523(Beta).exe
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Njrat-main/NjRat 0.7D Green Edition by im523.exe
Resource
win11-20240508-en
General
-
Target
Njrat-main/NjRat 0.7D Green Edition by im523.exe
-
Size
20.2MB
-
MD5
348c0bd0ef7201d06bf159e115aa8260
-
SHA1
86395b0584650b9741af89ba45432558479f8111
-
SHA256
68028a6306c0343792b73783806e45c47b3b2c332580e6dd7c14efce4571f014
-
SHA512
6f3bedf2e8c4cb91a496dcdc371dc19839e50a0308927039e29958f49f529324f6665f0a85a1b4bc2c6c23eee493fefbee8fa2f5fcc5000a64a600caedd21203
-
SSDEEP
393216:z3333333333333qafiI6bReDy4HRamQ0qGCgVSfF+kxAb+nwSuPf06zMrqnoZHjP:z3333333333333NfklP4HRbQ0wuzjM6m
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
~__UNINST.EXENjRat 0.7D Green Edition by im523.exepid process 1068 ~__UNINST.EXE 3060 NjRat 0.7D Green Edition by im523.exe -
Loads dropped DLL 7 IoCs
Processes:
NjRat 0.7D Green Edition by im523.exe~__UNINST.EXENjRat 0.7D Green Edition by im523.exepid process 2820 NjRat 0.7D Green Edition by im523.exe 1068 ~__UNINST.EXE 1068 ~__UNINST.EXE 1068 ~__UNINST.EXE 1068 ~__UNINST.EXE 3060 NjRat 0.7D Green Edition by im523.exe 3060 NjRat 0.7D Green Edition by im523.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
NjRat 0.7D Green Edition by im523.exepid process 3060 NjRat 0.7D Green Edition by im523.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
NjRat 0.7D Green Edition by im523.exepid process 3060 NjRat 0.7D Green Edition by im523.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
NjRat 0.7D Green Edition by im523.exe~__UNINST.EXEdescription pid process target process PID 2820 wrote to memory of 1068 2820 NjRat 0.7D Green Edition by im523.exe ~__UNINST.EXE PID 2820 wrote to memory of 1068 2820 NjRat 0.7D Green Edition by im523.exe ~__UNINST.EXE PID 2820 wrote to memory of 1068 2820 NjRat 0.7D Green Edition by im523.exe ~__UNINST.EXE PID 2820 wrote to memory of 1068 2820 NjRat 0.7D Green Edition by im523.exe ~__UNINST.EXE PID 2820 wrote to memory of 1068 2820 NjRat 0.7D Green Edition by im523.exe ~__UNINST.EXE PID 2820 wrote to memory of 1068 2820 NjRat 0.7D Green Edition by im523.exe ~__UNINST.EXE PID 2820 wrote to memory of 1068 2820 NjRat 0.7D Green Edition by im523.exe ~__UNINST.EXE PID 1068 wrote to memory of 3060 1068 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 1068 wrote to memory of 3060 1068 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 1068 wrote to memory of 3060 1068 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 1068 wrote to memory of 3060 1068 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 1068 wrote to memory of 3060 1068 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 1068 wrote to memory of 3060 1068 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe PID 1068 wrote to memory of 3060 1068 ~__UNINST.EXE NjRat 0.7D Green Edition by im523.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Njrat-main\NjRat 0.7D Green Edition by im523.exe"C:\Users\Admin\AppData\Local\Temp\Njrat-main\NjRat 0.7D Green Edition by im523.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE"C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE" C:\Users\Admin\AppData\Local\Temp\Njrat-main\NjRat 0.7D Green Edition by im523.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Green Edition by im523.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51033c448810d3b507423546432e2f502
SHA12bf9d04f68ed15b957378fb95daa78c85d5b2b26
SHA256f0c85722b88d1e7a1941ba17551cd5c29aef99fad86d78a5631a0f5446b3f580
SHA512aeb964632dfad41fc383a68ace0e6beb152a7075f21a32e449624a27da5d2a5ccda0665fbd90597d65d74b0790877baf6f81336660b1df4bf38b41cd0bc6cd44
-
Filesize
20.2MB
MD5348c0bd0ef7201d06bf159e115aa8260
SHA186395b0584650b9741af89ba45432558479f8111
SHA25668028a6306c0343792b73783806e45c47b3b2c332580e6dd7c14efce4571f014
SHA5126f3bedf2e8c4cb91a496dcdc371dc19839e50a0308927039e29958f49f529324f6665f0a85a1b4bc2c6c23eee493fefbee8fa2f5fcc5000a64a600caedd21203