Analysis
-
max time kernel
1799s -
max time network
1800s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 16:53
Behavioral task
behavioral1
Sample
njRAT-RED-V12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
njRAT-RED-V12.exe
Resource
win10v2004-20240802-en
General
-
Target
njRAT-RED-V12.exe
-
Size
27KB
-
MD5
6bafe0541bffb68e63ef17c551258ac6
-
SHA1
804366c8260b1fd73ed84e4a5a65c159aa8def05
-
SHA256
0a2b53b63e489324c13eb75d7543a4e10755ae341522e1e795230c1eeffe8bff
-
SHA512
9d3ef0651f79b590aa8a334daf4bcbba079052b7c38717b3bf0b5e67ebecee91757039d08697c86b197f2518314e5bd2f1a459b8b9c7e12cd3a11b0e08836409
-
SSDEEP
384:ILZxZ3ZfjHnGgk8QgLLwv6mxEP9AOWIMNAQk93vmhm7UMKmIEecKdbXTzm9bVhcF:2931jHGqghNA/vMHTi9bD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation njRAT-RED-V12.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk njRAT-RED-V12.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Updater.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 Updater.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Updater.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Windows\\Updater.exe" njRAT-RED-V12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Updater.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Updater.exe njRAT-RED-V12.exe File opened for modification C:\Windows\Updater.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njRAT-RED-V12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1656 Updater.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe Token: SeIncBasePriorityPrivilege 1656 Updater.exe Token: 33 1656 Updater.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1656 1700 njRAT-RED-V12.exe 89 PID 1700 wrote to memory of 1656 1700 njRAT-RED-V12.exe 89 PID 1700 wrote to memory of 1656 1700 njRAT-RED-V12.exe 89 PID 1700 wrote to memory of 1904 1700 njRAT-RED-V12.exe 90 PID 1700 wrote to memory of 1904 1700 njRAT-RED-V12.exe 90 PID 1700 wrote to memory of 1904 1700 njRAT-RED-V12.exe 90 PID 1656 wrote to memory of 5888 1656 Updater.exe 94 PID 1656 wrote to memory of 5888 1656 Updater.exe 94 PID 1656 wrote to memory of 5888 1656 Updater.exe 94 PID 1656 wrote to memory of 5880 1656 Updater.exe 95 PID 1656 wrote to memory of 5880 1656 Updater.exe 95 PID 1656 wrote to memory of 5880 1656 Updater.exe 95 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1904 attrib.exe 5888 attrib.exe 5880 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\njRAT-RED-V12.exe"C:\Users\Admin\AppData\Local\Temp\njRAT-RED-V12.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Updater.exe"C:\Windows\Updater.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5888
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5880
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Windows\Updater.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=944,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:81⤵PID:1500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3812,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4908 /prefetch:81⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5535e7af4a92452eb36030af919f5452d
SHA18a2df10da262e9a8c14dc2dc45e601e65032b23a
SHA2569790bc54c3927b25c28376f55851c54111af19a0019758ccf3b74c986a5989ac
SHA512678fb1c9fbf575e54827d2872aea768257331c13d862b8f60253f7329a5d41df70bea2409ad5ff4acd4ab117ee82ebb515b0b2ff48fc776beab8398c2d0d4189
-
Filesize
1KB
MD5c42ac0abd4dc7de84037ac38260e8d3d
SHA1d7e4d0b8d8cdcc5ed6cd0791604a98b682dd466c
SHA25683028a556c575d7b1eaaf295927233a4e191a79d406a6fec4bfcec9cfe4ec887
SHA512bd5b1cc781747c03665cebcc38ef7ebed67e431f93220863d5e0b5392676b270b16fa2473c9d7645daca33d1f746935d92dd4aaa2c2927796147816c3d132e5e
-
Filesize
27KB
MD56bafe0541bffb68e63ef17c551258ac6
SHA1804366c8260b1fd73ed84e4a5a65c159aa8def05
SHA2560a2b53b63e489324c13eb75d7543a4e10755ae341522e1e795230c1eeffe8bff
SHA5129d3ef0651f79b590aa8a334daf4bcbba079052b7c38717b3bf0b5e67ebecee91757039d08697c86b197f2518314e5bd2f1a459b8b9c7e12cd3a11b0e08836409