Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 22:28

General

  • Target

    c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe

  • Size

    2.2MB

  • MD5

    2245fe5aceb9a49b4a455af092baffad

  • SHA1

    bfc5557d1597a1d73cc2f24ae1d492ddb47620c1

  • SHA256

    c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af

  • SHA512

    bc39f127e066c5a350883e3f8a40ee268ac35f1ea582f8c093aecf6aa8d0060f0d4760307d96480dc62b3f4cb005df6a6ead1763ac7256290bfc8aab6b03bdcf

  • SSDEEP

    1536:mXhng5WlEimwwam+fgMtQW3hKfSsLnw5HzOsr05Kcgej8e6LXFqOi6:6hnwiQQgScw5i2

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

jokaretsoooo.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe
    "C:\Users\Admin\AppData\Local\Temp\c0310df0f31ce1c56562d8f6c9e4398f90028ebfd49afaba760963b6510ad2af.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1152-0-0x00007FFB45405000-0x00007FFB45406000-memory.dmp

    Filesize

    4KB

  • memory/1152-1-0x000000001BFE0000-0x000000001C086000-memory.dmp

    Filesize

    664KB

  • memory/1152-2-0x00007FFB45150000-0x00007FFB45AF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-3-0x000000001C560000-0x000000001CA2E000-memory.dmp

    Filesize

    4.8MB

  • memory/1152-4-0x000000001CB10000-0x000000001CBAC000-memory.dmp

    Filesize

    624KB

  • memory/1152-5-0x00000000018C0000-0x00000000018C8000-memory.dmp

    Filesize

    32KB

  • memory/1152-6-0x000000001CC70000-0x000000001CCBC000-memory.dmp

    Filesize

    304KB

  • memory/1152-7-0x00007FFB45150000-0x00007FFB45AF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-8-0x0000000001890000-0x00000000018A2000-memory.dmp

    Filesize

    72KB

  • memory/1152-9-0x00007FFB45405000-0x00007FFB45406000-memory.dmp

    Filesize

    4KB

  • memory/1152-10-0x00007FFB45150000-0x00007FFB45AF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-11-0x00007FFB45150000-0x00007FFB45AF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-12-0x00007FFB45150000-0x00007FFB45AF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-13-0x00007FFB45150000-0x00007FFB45AF1000-memory.dmp

    Filesize

    9.6MB