Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:02

General

  • Target

    af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe

  • Size

    2.1MB

  • MD5

    d56461561f3059f2e813701fa8f6cc00

  • SHA1

    7805b8f2434c00edba2345211309dacfdbc3cf44

  • SHA256

    af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3

  • SHA512

    22f366d0518dc3e6d13a2f171c601c8c2f4925813dcb2575fbc5f84079dbff3c5e1953d74c12a1191cca375c8330cd73f8e16775f386fa9d96ddc895e9ea0323

  • SSDEEP

    24576:lGxi5Rkwn374VL3KxLOC/kOlcqEwHh6efhd/:

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

jokaretsoooo.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe
    "C:\Users\Admin\AppData\Local\Temp\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2096-0-0x000007FEF674E000-0x000007FEF674F000-memory.dmp

    Filesize

    4KB

  • memory/2096-1-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2096-2-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2096-3-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2096-4-0x0000000000270000-0x0000000000282000-memory.dmp

    Filesize

    72KB

  • memory/2096-5-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2096-6-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB