Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe
Resource
win10v2004-20240910-en
General
-
Target
d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe
-
Size
654KB
-
MD5
83e901a978502b12b11688d1bf742ef5
-
SHA1
92f530bee150a952153bfec430f11ba0e24bea51
-
SHA256
d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c
-
SHA512
c8772079caa38a65d4964bb4818d304f13cf5c1f60cea93e4a0a4e501b5885da66abce6ce42603844df0c26fdb7c47dfcf704d77857fa6e8e643c107413268bb
-
SSDEEP
12288:tqjenzbxpLEGxvMnX3k9bdRWZXeogSBw/7TzJkDEz+tO0cJHK:tq09YYmMSB8z6Qz+kNK
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
encrypted7745.hopto.org:1177
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe\" .." d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe\" .." d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: 33 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe Token: SeIncBasePriorityPrivilege 2672 d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe"C:\Users\Admin\AppData\Local\Temp\d6b68928361ae07d5048c8b126efe974f22bf8b311de2d2faee50f18bd28ab9c.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2672