Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:02

General

  • Target

    af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe

  • Size

    2.1MB

  • MD5

    d56461561f3059f2e813701fa8f6cc00

  • SHA1

    7805b8f2434c00edba2345211309dacfdbc3cf44

  • SHA256

    af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3

  • SHA512

    22f366d0518dc3e6d13a2f171c601c8c2f4925813dcb2575fbc5f84079dbff3c5e1953d74c12a1191cca375c8330cd73f8e16775f386fa9d96ddc895e9ea0323

  • SSDEEP

    24576:lGxi5Rkwn374VL3KxLOC/kOlcqEwHh6efhd/:

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

jokaretsoooo.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe
    "C:\Users\Admin\AppData\Local\Temp\af809a7846a623cd5f24c48bd70785909243da70a17a46b753d7dc856a0066c3N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1892-0-0x00007FF8A29E0000-0x00007FF8A2AEB000-memory.dmp

    Filesize

    1.0MB

  • memory/1892-1-0x000000001BB70000-0x000000001BC16000-memory.dmp

    Filesize

    664KB

  • memory/1892-2-0x000000001C0F0000-0x000000001C5BE000-memory.dmp

    Filesize

    4.8MB

  • memory/1892-3-0x000000001C670000-0x000000001C70C000-memory.dmp

    Filesize

    624KB

  • memory/1892-4-0x0000000001320000-0x0000000001328000-memory.dmp

    Filesize

    32KB

  • memory/1892-5-0x000000001C7D0000-0x000000001C81C000-memory.dmp

    Filesize

    304KB

  • memory/1892-6-0x00000000012F0000-0x0000000001302000-memory.dmp

    Filesize

    72KB

  • memory/1892-7-0x00007FF8A29E0000-0x00007FF8A2AEB000-memory.dmp

    Filesize

    1.0MB