Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
hhhh77.exe
Resource
win7-20240903-en
General
-
Target
hhhh77.exe
-
Size
8.3MB
-
MD5
9214afbf5645990e16a4935d4b66a2e1
-
SHA1
ff88a1ba0e19d31f9ffbf0c5844709654d33a441
-
SHA256
430365bd280fcc6e3a8f2912dad54c397e0c6dabd4dbf505cd95e53bdc8dc36a
-
SHA512
21b8c7b9d28ddd745fa283cf449af7e248b7bde410217fa625a0654381247ad7012983a26b8f84d13cf610bb28180bd6e497a75368df637609d69f8f58e4ec31
-
SSDEEP
196608:IIcwMCzK6VFMW/sd0PVVlMyELNCMgZsHcSCD:JNmyFW+Px0NIycf
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:4344
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1892 Server_protected.sfx.exe 2704 ngrok.exe 2804 Server_protected.exe -
Loads dropped DLL 9 IoCs
pid Process 948 hhhh77.exe 948 hhhh77.exe 948 hhhh77.exe 948 hhhh77.exe 948 hhhh77.exe 2828 Process not Found 1892 Server_protected.sfx.exe 1892 Server_protected.sfx.exe 1892 Server_protected.sfx.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe 2804 Server_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhh77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server_protected.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server_protected.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 Server_protected.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe Token: 33 2804 Server_protected.exe Token: SeIncBasePriorityPrivilege 2804 Server_protected.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 Server_protected.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 948 wrote to memory of 1892 948 hhhh77.exe 31 PID 948 wrote to memory of 1892 948 hhhh77.exe 31 PID 948 wrote to memory of 1892 948 hhhh77.exe 31 PID 948 wrote to memory of 1892 948 hhhh77.exe 31 PID 948 wrote to memory of 2704 948 hhhh77.exe 32 PID 948 wrote to memory of 2704 948 hhhh77.exe 32 PID 948 wrote to memory of 2704 948 hhhh77.exe 32 PID 948 wrote to memory of 2704 948 hhhh77.exe 32 PID 1892 wrote to memory of 2804 1892 Server_protected.sfx.exe 34 PID 1892 wrote to memory of 2804 1892 Server_protected.sfx.exe 34 PID 1892 wrote to memory of 2804 1892 Server_protected.sfx.exe 34 PID 1892 wrote to memory of 2804 1892 Server_protected.sfx.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\hhhh77.exe"C:\Users\Admin\AppData\Local\Temp\hhhh77.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Server_protected.sfx.exe"C:\Users\Admin\AppData\Local\Temp\Server_protected.sfx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Server_protected.exe"C:\Users\Admin\AppData\Local\Temp\Server_protected.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\ngrok.exe"C:\Users\Admin\AppData\Local\Temp\ngrok.exe"2⤵
- Executes dropped EXE
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d284ba1f09e8c41cd5cdfb0fdb6ec60a
SHA1821908e7bbecc9944bb8c5c2c190c93e6ed40b42
SHA25616a4198de8bdfbfbbf06ca8961d9a5735aa3dd5890d1cc38659ec329871e9b32
SHA5125b7570751241b1974546cdf93d172d9aac9173c47f10ce49bcc2cedc52ab07da40303cf74cd7332ae9c5c8fa0d08344b02d00c5ba6667f67fb71bca22ce63c9c
-
Filesize
1.4MB
MD5376851986979da63538461616c848b21
SHA10064b8eb1ae310829c80c6524e765338ff5894a8
SHA2564603cbbf2c03fa34fe567f62b6a273566967c2203187c6ebc16b4c5fb71a965c
SHA512d4c6b6e3a5ba49492484089c7660e7a702912e7b26d3d2c3e0f4b96ec1aa001d7f7859e7cb86ac3186d80c19bfe6ecb1cbfcba06ecf3ddb8c5388cec08dc4d3e
-
Filesize
26.3MB
MD54135fe39c7a56d4d4e6a3a86d7ee3f77
SHA1a2d7898d488b08294d659c88ed439bc5c8352d65
SHA2569b18df84a96f68f8726d26bc661a86a984d8fda4e5e8c2641ad91d103d028b05
SHA512b056ee468b3b6c4276be6cd185d677bedbd594a65fa1c283ddd035c5232c207a478e0a7e339bb4efaec9c0c2d86ce16547600e56bf93a4d69be4f91232361338