Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2024 02:35

General

  • Target

    ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe

  • Size

    1.8MB

  • MD5

    62eb39057d95dd087a375494c49f9c59

  • SHA1

    4c767ef04e629c21c700d7f286af76953c86174b

  • SHA256

    ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f

  • SHA512

    19e15b07a8071d14b17712df3801dec1078aa8ed350792d809b8221c6bbd989991a58c156a607e69b961f8624dc81e22e532e7783846db941df4ef5c3ca853b2

  • SSDEEP

    1536:G1LOYSUxuJW9+I4x/pR7CbX3k0Y9HlAdu0VS2Djw/xxEcs51YgCggQFyWLPpi4hs:GCuuJg+I4x/fCbX3uvEgEcs511VThs

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

jokaretsoooo.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe
    "C:\Users\Admin\AppData\Local\Temp\ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:4364
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:8
    1⤵
      PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4364-0-0x00007FFAC7775000-0x00007FFAC7776000-memory.dmp

      Filesize

      4KB

    • memory/4364-1-0x000000001B220000-0x000000001B2C6000-memory.dmp

      Filesize

      664KB

    • memory/4364-2-0x00007FFAC74C0000-0x00007FFAC7E61000-memory.dmp

      Filesize

      9.6MB

    • memory/4364-3-0x000000001B7A0000-0x000000001BC6E000-memory.dmp

      Filesize

      4.8MB

    • memory/4364-4-0x000000001BD90000-0x000000001BE2C000-memory.dmp

      Filesize

      624KB

    • memory/4364-6-0x00007FFAC74C0000-0x00007FFAC7E61000-memory.dmp

      Filesize

      9.6MB

    • memory/4364-7-0x000000001BEF0000-0x000000001BF3C000-memory.dmp

      Filesize

      304KB

    • memory/4364-5-0x000000001B1B0000-0x000000001B1B8000-memory.dmp

      Filesize

      32KB

    • memory/4364-8-0x000000001B1F0000-0x000000001B202000-memory.dmp

      Filesize

      72KB

    • memory/4364-10-0x00007FFAC74C0000-0x00007FFAC7E61000-memory.dmp

      Filesize

      9.6MB

    • memory/4364-9-0x00007FFAC7775000-0x00007FFAC7776000-memory.dmp

      Filesize

      4KB

    • memory/4364-12-0x00007FFAC74C0000-0x00007FFAC7E61000-memory.dmp

      Filesize

      9.6MB

    • memory/4364-11-0x00007FFAC74C0000-0x00007FFAC7E61000-memory.dmp

      Filesize

      9.6MB

    • memory/4364-13-0x00007FFAC74C0000-0x00007FFAC7E61000-memory.dmp

      Filesize

      9.6MB