Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe
Resource
win7-20240903-en
General
-
Target
449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe
-
Size
327KB
-
MD5
51b869db68994c50f63c8fbe4054a346
-
SHA1
627a1343536b5ac1e6d1fd5b06792e906eedded4
-
SHA256
449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812
-
SHA512
65e7a8b499d08ac00862ecb0ba4bc5bf94334026368c3eefb77142543a445a05b6351811a815e8913deabe45ddbe6c91c2b2da957d928b567f0c494cec2cd629
-
SSDEEP
6144:mdeqxwx+PiZZTZP2I0MKff5ch7M1soSGpjpt4nh+2j3hVa9gXmiQt3K:aX5czoSGPt4p3hVfXmiQt6
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
seznam.hopto.org:5050
a321f292c1b24fe7931
-
reg_key
a321f292c1b24fe7931
-
splitter
@!#&^%$
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: 33 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe Token: SeIncBasePriorityPrivilege 2932 449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe"C:\Users\Admin\AppData\Local\Temp\449ce4867605f3e0314710eee5031b05ffc2c9b1cedc6214160b575a53de6812.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2932