Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 13:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe
-
Size
33KB
-
MD5
0d052a68cf7ca01c710d4ce7ea9dfe30
-
SHA1
52a482036a75664add6e214e0986c1303a1933eb
-
SHA256
9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31a
-
SHA512
f9f995da76828ebc270b5d7c6468cd59647270e0d8e46be1341691fb32abe783982464a6531384780cc22b6ffe0313e7c3141cf2be9cf8f1a6637a569a156b28
-
SSDEEP
768:VvTnv6kk5ftm4uw4yNUHOj3t+UG78iK1KB/9dZ:tv6kk5ftjuw4y+S9nG4TgBF
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
127.0.0.1:5552
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|'|'|
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings 9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2860 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe"C:\Users\Admin\AppData\Local\Temp\9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe"1⤵
- Modifies registry class
PID:2636
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2860