Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
0400b010d3a4e948bd4199f828831010N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0400b010d3a4e948bd4199f828831010N.exe
Resource
win10v2004-20240802-en
General
-
Target
0400b010d3a4e948bd4199f828831010N.exe
-
Size
345KB
-
MD5
0400b010d3a4e948bd4199f828831010
-
SHA1
e718e3f6991de3a6f0981cac55a9b4171322714c
-
SHA256
91586085339b9ec8765067eaccec4c94b8753a04c8dc00cd446909ac5c944838
-
SHA512
8c98bdbf68d1fd2d9810d6ba3e4139f5f729d05ef0c2d4c9cf1a2e11f97a6621a1d8eedb39bcbf385ffb79b595e5ca6b166b3d38ff9802c8048181631ccd1569
-
SSDEEP
3072:qqQ2P1iVBqRbspn4sl9HIxCLaVmFlYbuBUXWNgmTQ9CrsZeLr+1onaRs50ClDaRw:g2PQVBqRbsf4REM9UY1bO96jMQ
Malware Config
Extracted
njrat
0.7d
clien
hakim32.ddns.net:2000
147.185.221.18:61276
f7e6d24b4a113d9753558dfbb032c2ac
-
reg_key
f7e6d24b4a113d9753558dfbb032c2ac
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2564 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0400b010d3a4e948bd4199f828831010N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe 2492 0400b010d3a4e948bd4199f828831010N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 0400b010d3a4e948bd4199f828831010N.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe Token: 33 2492 0400b010d3a4e948bd4199f828831010N.exe Token: SeIncBasePriorityPrivilege 2492 0400b010d3a4e948bd4199f828831010N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2564 2492 0400b010d3a4e948bd4199f828831010N.exe 30 PID 2492 wrote to memory of 2564 2492 0400b010d3a4e948bd4199f828831010N.exe 30 PID 2492 wrote to memory of 2564 2492 0400b010d3a4e948bd4199f828831010N.exe 30 PID 2492 wrote to memory of 2564 2492 0400b010d3a4e948bd4199f828831010N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0400b010d3a4e948bd4199f828831010N.exe"C:\Users\Admin\AppData\Local\Temp\0400b010d3a4e948bd4199f828831010N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\0400b010d3a4e948bd4199f828831010N.exe" "0400b010d3a4e948bd4199f828831010N.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2564
-