Resubmissions
03-06-2024 01:02
240603-bdymqaeg88 10Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe
Resource
win7-20240221-en
General
-
Target
1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe
-
Size
969KB
-
MD5
12daff9aeb48e2e9f3d2e357b9636f5a
-
SHA1
edb9e465c3ec6b1935b5ab307a22f08f409d829d
-
SHA256
1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518
-
SHA512
5390e065174e56cbde78869fb65a0d33be66452674db961c00bb72c2081a8b6156b7d68fd7a0ce20fdedd6c01fcb5418056c3542d6122f1668fcf76c452f30f2
-
SSDEEP
12288:NaSv30fd/rz2iNcHcvn0+xAEbZUVFR9uqWjqf00lU6:530V/rz13TPUVF4j6
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
seznam.zapto.org:5050
51f5e4b21a09
-
reg_key
51f5e4b21a09
-
splitter
@!#&^%$
Signatures
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exedescription pid process Token: SeDebugPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: 33 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe Token: SeIncBasePriorityPrivilege 3400 1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe"C:\Users\Admin\AppData\Local\Temp\1881cfa52f02f01bd78e903782e69cfbe167f8673b8828371366736f24592518.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:3708
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3400-0-0x0000000074F0E000-0x0000000074F0F000-memory.dmpFilesize
4KB
-
memory/3400-1-0x0000000000CC0000-0x0000000000DB8000-memory.dmpFilesize
992KB
-
memory/3400-2-0x0000000005850000-0x00000000058EC000-memory.dmpFilesize
624KB
-
memory/3400-3-0x0000000001770000-0x000000000177C000-memory.dmpFilesize
48KB
-
memory/3400-4-0x0000000005FA0000-0x0000000006544000-memory.dmpFilesize
5.6MB
-
memory/3400-5-0x0000000005B30000-0x0000000005BC2000-memory.dmpFilesize
584KB
-
memory/3400-6-0x0000000074F00000-0x00000000756B0000-memory.dmpFilesize
7.7MB
-
memory/3400-7-0x0000000005AE0000-0x0000000005AEA000-memory.dmpFilesize
40KB
-
memory/3400-8-0x0000000005D30000-0x0000000005D96000-memory.dmpFilesize
408KB
-
memory/3400-9-0x0000000074F0E000-0x0000000074F0F000-memory.dmpFilesize
4KB
-
memory/3400-10-0x0000000074F00000-0x00000000756B0000-memory.dmpFilesize
7.7MB