Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe
Resource
win10v2004-20240802-en
General
-
Target
ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe
-
Size
1.8MB
-
MD5
62eb39057d95dd087a375494c49f9c59
-
SHA1
4c767ef04e629c21c700d7f286af76953c86174b
-
SHA256
ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f
-
SHA512
19e15b07a8071d14b17712df3801dec1078aa8ed350792d809b8221c6bbd989991a58c156a607e69b961f8624dc81e22e532e7783846db941df4ef5c3ca853b2
-
SSDEEP
1536:G1LOYSUxuJW9+I4x/pR7CbX3k0Y9HlAdu0VS2Djw/xxEcs51YgCggQFyWLPpi4hs:GCuuJg+I4x/fCbX3uvEgEcs511VThs
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
jokaretsoooo.ddns.net:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe\" .." ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe\" .." ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: 33 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe Token: SeIncBasePriorityPrivilege 4364 ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe"C:\Users\Admin\AppData\Local\Temp\ea15f53345104f775ba3bdb43e74a8256ac395f82390d2bfe69bd41b74af394f.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:2876