Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe
Resource
win10v2004-20240508-en
General
-
Target
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe
-
Size
884KB
-
MD5
84875b4283fa59685172a0ea7f7e7ac0
-
SHA1
1bf08442e7e3284e529d4f30bd8b5559d054e4d7
-
SHA256
b51028907f6b360042638f29505aa13b31e491b95ed02372f6a737a9efdc8e15
-
SHA512
343301e074406841a6082754dc20b13f94059b89bf4a2099ac281787116ff3bbebc58f0d67c84788e19e28f662dd63ebdf70bca8d9164b9e2e450567c5877bcc
-
SSDEEP
24576:8u6J33O0c+JY5UZ+XC0kGsoTacbl6u2idWYd:mu0c++OCvkGsEacJ67bYd
Malware Config
Extracted
njrat
0.7d
14 mai generateur xbox
89.94.35.57:1604
ef05e501c2e286164abf5fcaa961559f
-
reg_key
ef05e501c2e286164abf5fcaa961559f
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3020 netsh.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4684-0-0x0000000000430000-0x0000000000513000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exedescription pid process target process PID 4684 set thread context of 4192 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exepid process 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe Token: 33 4192 RegAsm.exe Token: SeIncBasePriorityPrivilege 4192 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exepid process 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exepid process 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exeRegAsm.exedescription pid process target process PID 4684 wrote to memory of 4192 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe RegAsm.exe PID 4684 wrote to memory of 4192 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe RegAsm.exe PID 4684 wrote to memory of 4192 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe RegAsm.exe PID 4684 wrote to memory of 4192 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe RegAsm.exe PID 4684 wrote to memory of 4192 4684 virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe RegAsm.exe PID 4192 wrote to memory of 3020 4192 RegAsm.exe netsh.exe PID 4192 wrote to memory of 3020 4192 RegAsm.exe netsh.exe PID 4192 wrote to memory of 3020 4192 RegAsm.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_84875b4283fa59685172a0ea7f7e7ac0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3020