Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 00:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe
-
Size
25KB
-
MD5
fce7de0e79524252e0ae0e593a71546b
-
SHA1
f8afe24e5409f944f0dd097171be398bc9a083a7
-
SHA256
9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e
-
SHA512
369b27e878b1ca0824ced1efd29138020c9912831431526f2ab91eaecb4cfe62ba1be0d7fb6a5a3a5ae14e39f6dc1465b0cfcc5228eef6c1dffc5ff5ca141d0d
-
SSDEEP
384:sv3ZIa+kP/00CMJW/H3u57FG0TDNDun7pryCTic7HSDwRjzMikApEj2+v:svpo/09MXAFG0nNyg4hHScRjAAp+2+v
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
HacKed
C2
127.0.0.1:5552
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: 33 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe Token: SeIncBasePriorityPrivilege 4160 9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe"C:\Users\Admin\AppData\Local\Temp\9388606a0ba68e6a1d7d198a038aee3a148edce494b92337c11924ccf2b3b90e.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4160