Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
d942da836a814ed7cdc398c5df73ccca81cb43c19be10a459d786d584d83104a.exe
Resource
win7-20240729-en
General
-
Target
d942da836a814ed7cdc398c5df73ccca81cb43c19be10a459d786d584d83104a.exe
-
Size
138KB
-
MD5
4fb1ac905ae5c8aea4b23706f4474c4d
-
SHA1
0717512f51a144b121bdcfa17575bb3cf2937a77
-
SHA256
d942da836a814ed7cdc398c5df73ccca81cb43c19be10a459d786d584d83104a
-
SHA512
7872bd9d9f18f34cdb8f72c41ca061ec405ab0bad745409be9af4592c93e1aacee8622fe7d1040283b5903cc8cb4493324f95bb16f0dc3a940bf82695a7ac23a
-
SSDEEP
3072:aMtdiO7525FVOxtEUxQ9E2Ue9qokTTp/7HgveVVe9C18:liUIJOINHUe9qoerVVe9C
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:50
e99e462d99ad204bdf7d672852a4e30a
-
reg_key
e99e462d99ad204bdf7d672852a4e30a
-
splitter
|'|'|
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1456 dw20.exe Token: SeBackupPrivilege 1456 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1456 1628 d942da836a814ed7cdc398c5df73ccca81cb43c19be10a459d786d584d83104a.exe 84 PID 1628 wrote to memory of 1456 1628 d942da836a814ed7cdc398c5df73ccca81cb43c19be10a459d786d584d83104a.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d942da836a814ed7cdc398c5df73ccca81cb43c19be10a459d786d584d83104a.exe"C:\Users\Admin\AppData\Local\Temp\d942da836a814ed7cdc398c5df73ccca81cb43c19be10a459d786d584d83104a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8322⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1456
-