Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
Wire Notification.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Wire Notification.jar
Resource
win10v2004-20241007-en
General
-
Target
Wire Notification.jar
-
Size
560KB
-
MD5
22b2dd04bb82b6fb05f6d148255c14c6
-
SHA1
782faf733ea7d5e36f5e77dd66a7e16fa2f7f86d
-
SHA256
dd33019c84b905443de022d1ff40146e7d1a2b5b472a3e1589b0ecb36ee64555
-
SHA512
295eed7bd9cc01f499896f53cc764836fc04513e79434e9b1365bae7105f4ef09cbb668224d9a1653d945a8d7d190693f182cc40307a0a92dec2e916dd7c82c7
-
SSDEEP
12288:k9f0DrXoyn7Dg0G4ZCLrK6PxEgZ7QBjm/i01rXoyNpDC0GUaResHMO:k50PXtG4ZQpx7QBCa0pXbGdMnO
Malware Config
Extracted
njrat
0.7d
HOME
popintertradeer.ddns.net:5552
8142474e71bf5da2c38d35d26869bf5c
8142474e71bf5da2c38d35d26869bf5c
-
reg_key
8142474e71bf5da2c38d35d26869bf5c
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3028 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation M.exe -
Executes dropped EXE 7 IoCs
pid Process 1492 nwi3593645304789568173.exe 4644 nwi250346192955862333.exe 1324 M.exe 4040 M.exe 4800 M.exe 4620 explorer.exe 3768 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" nwi250346192955862333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nwi3593645304789568173.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8142474e71bf5da2c38d35d26869bf5c = "\"C:\\Users\\Admin\\explorer.exe\" .." explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8142474e71bf5da2c38d35d26869bf5c = "\"C:\\Users\\Admin\\explorer.exe\" .." explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4040 set thread context of 4800 4040 M.exe 90 PID 4620 set thread context of 3768 4620 explorer.exe 92 -
resource yara_rule behavioral2/files/0x0008000000023c87-32.dat upx behavioral2/memory/1324-37-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1324-39-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4040-55-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4620-88-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwi250346192955862333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwi3593645304789568173.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4040 M.exe 4040 M.exe 4040 M.exe 4040 M.exe 4620 explorer.exe 4620 explorer.exe 4620 explorer.exe 4620 explorer.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe Token: 33 3768 explorer.exe Token: SeIncBasePriorityPrivilege 3768 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4040 M.exe 4040 M.exe 1324 M.exe 4620 explorer.exe 4620 explorer.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1492 1620 java.exe 86 PID 1620 wrote to memory of 1492 1620 java.exe 86 PID 1620 wrote to memory of 1492 1620 java.exe 86 PID 1620 wrote to memory of 4644 1620 java.exe 87 PID 1620 wrote to memory of 4644 1620 java.exe 87 PID 1620 wrote to memory of 4644 1620 java.exe 87 PID 1492 wrote to memory of 1324 1492 nwi3593645304789568173.exe 89 PID 1492 wrote to memory of 1324 1492 nwi3593645304789568173.exe 89 PID 1492 wrote to memory of 1324 1492 nwi3593645304789568173.exe 89 PID 4644 wrote to memory of 4040 4644 nwi250346192955862333.exe 88 PID 4644 wrote to memory of 4040 4644 nwi250346192955862333.exe 88 PID 4644 wrote to memory of 4040 4644 nwi250346192955862333.exe 88 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4040 wrote to memory of 4800 4040 M.exe 90 PID 4800 wrote to memory of 4620 4800 M.exe 91 PID 4800 wrote to memory of 4620 4800 M.exe 91 PID 4800 wrote to memory of 4620 4800 M.exe 91 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 4620 wrote to memory of 3768 4620 explorer.exe 92 PID 3768 wrote to memory of 3028 3768 explorer.exe 93 PID 3768 wrote to memory of 3028 3768 explorer.exe 93 PID 3768 wrote to memory of 3028 3768 explorer.exe 93
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Wire Notification.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\nwi3593645304789568173.exeC:\Users\Admin\AppData\Local\Temp\nwi3593645304789568173.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\M.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\M.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
-
C:\Users\Admin\AppData\Local\Temp\nwi250346192955862333.exeC:\Users\Admin\AppData\Local\Temp\nwi250346192955862333.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\explorer.exe"C:\Users\Admin\explorer.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\explorer.exeC:\Users\Admin\explorer.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\explorer.exe" "explorer.exe" ENABLE7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD549424f341f838a4ce27197aed4847598
SHA1aae80b2ba04bf5dfd584983aea9311138f7a291b
SHA2568ca3bcaccd0228a67aef40b148ee55800e0f5960433f93918e65b788fcea3ab0
SHA512e90b88ea10636e9ded71a4954934e429e26237450506b660ec0fa85a488c14a6e2160616d884763431bcc63d66276248302a826fa0b942381dd3a77a2fbf2181
-
Filesize
104KB
MD57bae06cbe364bb42b8c34fcfb90e3ebd
SHA179129af7efa46244da0676607242f0a6b7e12e78
SHA2566ceaebd55b4a542ef64be1d6971fcfe802e67e2027366c52faacc8a8d325ec7a
SHA512c599b72500a5c17cd5c4a81fcf220a95925aa0e5ad72aa92dd1a469fe6e3c23590c548a0be7ec2c4dbd737511a0a79c1c46436867cf7f0c4df21f8dcea9686cf
-
Filesize
153KB
MD5033ffa687f8e6c5ca059bb4c87a19f6c
SHA13918e4059745bbc2a90e2a8923696df646bb0d7c
SHA2561c759626d29d2f3105a0813f9a12fc7b2c46f5e4864c08bc2489d8ab7862bc87
SHA512d28b11f8318c8f795be7ff18e9447bd136bc96921f5f038f8b9ccb1a60f10c28b1a5bf3876d65e6e0db7b8dbfc483a31c0646cde121574cbe3f96f6b2b029025
-
Filesize
282KB
MD57ca883132f911dc51acbc93bbd3c025a
SHA1a24679540f4b0c7e40d8f4715791d6b98909b143
SHA256bd10e99fa6e2c7de3f76bea84f0b15cbf10ccb2badbe79e2a2c7370f90dc254e
SHA512bfb399eb4d4b0756f39bcf63e791ec199073a6a692e759d1bc0799b43223fa72be2f3b71a1b737c3858452cb149d99812d3ccc49c7c8dd2a12df2eae900f3451
-
Filesize
342KB
MD54cd2f4749d8f2e13849fb0481ea23b63
SHA1947e01c3d53b03e454921613abd3e3d27801f215
SHA256560166ce8f4c12322484e638b1b6f17d7d65157475aef1962339cc6848f921be
SHA5124e9f21e03d08bb20127a2bc0c4a61ab8454cf8644feab9df8d85687660e22403e8e7dd310d24bc8ac3a3e35dc3b145130d6517710654b7bde2798aafe7e387e4