Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
6650a384367acf072fc798cfc0c40e74.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6650a384367acf072fc798cfc0c40e74.exe
Resource
win10v2004-20240802-en
General
-
Target
6650a384367acf072fc798cfc0c40e74.exe
-
Size
512KB
-
MD5
6650a384367acf072fc798cfc0c40e74
-
SHA1
aa89e965c2b5904d8c970ff21e4159cd63bcaf99
-
SHA256
f4bc8c2bcd243d67ed8cd5442dcc07460790dbcfa0d04a245f9333b900f7c022
-
SHA512
658dde54c128e0e4e8ff33c4e2deebed1251c0cc95920026023a9a0bb0f895ba877aa56ec58f0db10a9e4878a146a9d0c11ea92d924829fdbbefaa53dc52bee6
-
SSDEEP
12288:RYIsJ6miMYnyTF4Pb47oDYIWtA2VpLIqAY:YPiMYnymj47oDYIWtfpL
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
encrypted7745.hopto.org:1177
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 6650a384367acf072fc798cfc0c40e74.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 6650a384367acf072fc798cfc0c40e74.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6650a384367acf072fc798cfc0c40e74.exe\" .." 6650a384367acf072fc798cfc0c40e74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6650a384367acf072fc798cfc0c40e74.exe\" .." 6650a384367acf072fc798cfc0c40e74.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 6650a384367acf072fc798cfc0c40e74.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe Token: 33 1376 6650a384367acf072fc798cfc0c40e74.exe Token: SeIncBasePriorityPrivilege 1376 6650a384367acf072fc798cfc0c40e74.exe