Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe
Resource
win10v2004-20240802-en
General
-
Target
af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe
-
Size
2.1MB
-
MD5
d56461561f3059f2e813701fa8f6cc00
-
SHA1
7805b8f2434c00edba2345211309dacfdbc3cf44
-
SHA256
af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3
-
SHA512
22f366d0518dc3e6d13a2f171c601c8c2f4925813dcb2575fbc5f84079dbff3c5e1953d74c12a1191cca375c8330cd73f8e16775f386fa9d96ddc895e9ea0323
-
SSDEEP
24576:lGxi5Rkwn374VL3KxLOC/kOlcqEwHh6efhd/:
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
jokaretsoooo.ddns.net:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe\" .." af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe\" .." af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: 33 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe Token: SeIncBasePriorityPrivilege 2096 af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe"C:\Users\Admin\AppData\Local\Temp\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2096