Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe
Resource
win7-20240704-en
General
-
Target
0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe
-
Size
46KB
-
MD5
01d0114059c415bb846b28383bb62932
-
SHA1
55e4a7f91fb168a5580682135e1b7942d87caab6
-
SHA256
0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19
-
SHA512
20affe0e282b5b3660439f6999adca4f399975b6ad0519cde84b0d0c0b10b228c08539f4f46cb4f908d6364fa1b4b54560fde12d8cf7bc3de35682baed5d2f43
-
SSDEEP
768:hzOVemXzwd3P2g/o/IWtO9XXxKAXqZn5xEIh4G+Sco/JNFeBWzoTrtSTBdJ4F/JR:ZXmXYqIn9XhKQqZ5xERG+KNF02odS1/W
Malware Config
Extracted
njrat
v2.0
HacKed
147.185.221.22:24536
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk RegAsm.exe -
pid Process 1896 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 1896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe Token: 33 1652 RegAsm.exe Token: SeIncBasePriorityPrivilege 1652 RegAsm.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1896 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 30 PID 2200 wrote to memory of 1896 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 30 PID 2200 wrote to memory of 1896 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 30 PID 2200 wrote to memory of 1896 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 30 PID 2200 wrote to memory of 2256 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 32 PID 2200 wrote to memory of 2256 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 32 PID 2200 wrote to memory of 2256 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 32 PID 2200 wrote to memory of 2256 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 32 PID 2200 wrote to memory of 2256 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 32 PID 2200 wrote to memory of 2256 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 32 PID 2200 wrote to memory of 2256 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 32 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33 PID 2200 wrote to memory of 1652 2200 0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe"C:\Users\Admin\AppData\Local\Temp\0e5c6f334e14a60cb011a38a477a5a2f65550eec5969ea4070ba07d3aed73c19.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '' -Value '"C:\Users\Admin\AppData\Roaming\.exe"' -PropertyType 'String'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1652
-