Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 15:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
njRAT v0.7d.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
njRAT v0.7d.exe
-
Size
1.6MB
-
MD5
473e1a7be89c3a727176d4f9f5a64b69
-
SHA1
501eb2c1432ff2b4e5ff582ad82d0fca152adebc
-
SHA256
bf853789b938bdc5da8aaeb52511379a332c7cf238266a21bfcb0318a62e85cb
-
SHA512
4d0ef049c83fe2790e8c201c643b68be26ae854feaeb154e7b1703c9f7c7250abc7307cef035f723fe8d5cf9d85175ff19a7bd37c403536617c8df9f9a7079fd
-
SSDEEP
24576:IB4Uzr6UeRmmZg8ADHWsJuFfo5jYbYzHSG/UpnMUnFz3Y/l0:7w+
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4680 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4680 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 100 njRAT v0.7d.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 100 njRAT v0.7d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\njRAT v0.7d.exe"C:\Users\Admin\AppData\Local\Temp\njRAT v0.7d.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:100
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4680