Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 22:28
Static task
static1
Behavioral task
behavioral1
Sample
c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe
Resource
win10v2004-20240802-en
General
-
Target
c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe
-
Size
2.2MB
-
MD5
2245fe5aceb9a49b4a455af092baffad
-
SHA1
bfc5557d1597a1d73cc2f24ae1d492ddb47620c1
-
SHA256
c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af
-
SHA512
bc39f127e066c5a350883e3f8a40ee268ac35f1ea582f8c093aecf6aa8d0060f0d4760307d96480dc62b3f4cb005df6a6ead1763ac7256290bfc8aab6b03bdcf
-
SSDEEP
1536:mXhng5WlEimwwam+fgMtQW3hKfSsLnw5HzOsr05Kcgej8e6LXFqOi6:6hnwiQQgScw5i2
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
jokaretsoooo.ddns.net:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe\" .." c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe\" .." c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: 33 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe Token: SeIncBasePriorityPrivilege 1152 c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe"C:\Users\Admin\AppData\Local\Temp\c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1152