Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
83e901a978502b12b11688d1bf742ef5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
83e901a978502b12b11688d1bf742ef5.exe
Resource
win10v2004-20240802-en
General
-
Target
83e901a978502b12b11688d1bf742ef5.exe
-
Size
654KB
-
MD5
83e901a978502b12b11688d1bf742ef5
-
SHA1
92f530bee150a952153bfec430f11ba0e24bea51
-
SHA256
d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c
-
SHA512
c8772079caa38a65d4964bb4818d304f13cf5c1f60cea93e4a0a4e501b5885da66abce6ce42603844df0c26fdb7c47dfcf704d77857fa6e8e643c107413268bb
-
SSDEEP
12288:tqjenzbxpLEGxvMnX3k9bdRWZXeogSBw/7TzJkDEz+tO0cJHK:tq09YYmMSB8z6Qz+kNK
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
encrypted7745.hopto.org:1177
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 83e901a978502b12b11688d1bf742ef5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 83e901a978502b12b11688d1bf742ef5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\83e901a978502b12b11688d1bf742ef5.exe\" .." 83e901a978502b12b11688d1bf742ef5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\83e901a978502b12b11688d1bf742ef5.exe\" .." 83e901a978502b12b11688d1bf742ef5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2124 83e901a978502b12b11688d1bf742ef5.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe Token: 33 2124 83e901a978502b12b11688d1bf742ef5.exe Token: SeIncBasePriorityPrivilege 2124 83e901a978502b12b11688d1bf742ef5.exe