Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 19:12
Behavioral task
behavioral1
Sample
0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe
Resource
win7-20240903-en
General
-
Target
0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe
-
Size
23KB
-
MD5
f2e6febd5ac77954b3c8f460d5fa2598
-
SHA1
7d7cffc86d330242f7f966d24dfd0605e2d21a23
-
SHA256
0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f
-
SHA512
68c92f47c337904aa58b3c64a0d3513e005e48bb0b9b0cd90b30cb2c31be6b54e1ba3a961af7f3370cc6fbb38ea66bde91d509988023f5d0912420fa6800b135
-
SSDEEP
384:xMsmCsg/EJHOzt+Z7SS1BEd1ng6Jgf24tfZVmRvR6JZlbw8hqIusZzZF/:trEi01jyRpcnuS
Malware Config
Extracted
njrat
Hallaj PRO Rat [Fixed]
HacKed
127.0.0.1:5552
984559f52d4087243e95e5ad9bb48e8d
-
reg_key
984559f52d4087243e95e5ad9bb48e8d
-
splitter
boolLove
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\984559f52d4087243e95e5ad9bb48e8d.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\984559f52d4087243e95e5ad9bb48e8d.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 server.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe Token: 33 2296 server.exe Token: SeIncBasePriorityPrivilege 2296 server.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2296 2240 0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe 29 PID 2240 wrote to memory of 2296 2240 0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe 29 PID 2240 wrote to memory of 2296 2240 0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe 29 PID 2240 wrote to memory of 2296 2240 0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe"C:\Users\Admin\AppData\Local\Temp\0eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5f2e6febd5ac77954b3c8f460d5fa2598
SHA17d7cffc86d330242f7f966d24dfd0605e2d21a23
SHA2560eb3ab9e4c6bc5903674d8f9b36a1a59825fa4e1c2d7209be4d7a0c16dc6168f
SHA51268c92f47c337904aa58b3c64a0d3513e005e48bb0b9b0cd90b30cb2c31be6b54e1ba3a961af7f3370cc6fbb38ea66bde91d509988023f5d0912420fa6800b135