Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe
Resource
win10v2004-20241007-en
General
-
Target
79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe
-
Size
1.5MB
-
MD5
4e8605fc4f563367bfc6c17b0814f9e0
-
SHA1
baf0a6501d82494cb3e6787bae049f89348a6bec
-
SHA256
79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2
-
SHA512
5ca177c98c54bfb318ac59a4a55a4cc07d0d667e9e48e139d1ec8dded53946345d5b623148cfabb98030ef9e976b30cad429fb62c9c9dd4b25b8930f3c2e41ae
-
SSDEEP
49152:ZUZMwyarkY6PQ5LeGJO8cH7mO2+Behc3WsP2b2OW:Znw8lRGwVHap+f3Ws+yP
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
legendek.viewdns.net:2228
56fe2dd164a1d408bef67d69fd4219dd
-
reg_key
56fe2dd164a1d408bef67d69fd4219dd
-
splitter
|'|'|
Signatures
-
Njrat family
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2852 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\microsoft.exe jce.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\microsoft.exe jce.exe -
Executes dropped EXE 4 IoCs
pid Process 2228 Ocean-mQ7Y4U7K9.exe 2592 jce.exe 1196 Process not Found 2704 qqaX6.exe -
Loads dropped DLL 4 IoCs
pid Process 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 2228 Ocean-mQ7Y4U7K9.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\microsoft.exe jce.exe File opened for modification C:\Windows\SysWOW64\microsoft.exe jce.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2704 qqaX6.exe 2704 qqaX6.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\microsoft.exe jce.exe File opened for modification C:\Program Files (x86)\microsoft.exe jce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2704 qqaX6.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe 2592 jce.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2592 jce.exe 2228 Ocean-mQ7Y4U7K9.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe Token: 33 2592 jce.exe Token: SeIncBasePriorityPrivilege 2592 jce.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 Ocean-mQ7Y4U7K9.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2228 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 30 PID 2620 wrote to memory of 2228 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 30 PID 2620 wrote to memory of 2228 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 30 PID 2620 wrote to memory of 2228 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 30 PID 2620 wrote to memory of 2592 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 31 PID 2620 wrote to memory of 2592 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 31 PID 2620 wrote to memory of 2592 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 31 PID 2620 wrote to memory of 2592 2620 79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe 31 PID 2228 wrote to memory of 2704 2228 Ocean-mQ7Y4U7K9.exe 33 PID 2228 wrote to memory of 2704 2228 Ocean-mQ7Y4U7K9.exe 33 PID 2228 wrote to memory of 2704 2228 Ocean-mQ7Y4U7K9.exe 33 PID 2592 wrote to memory of 2852 2592 jce.exe 35 PID 2592 wrote to memory of 2852 2592 jce.exe 35 PID 2592 wrote to memory of 2852 2592 jce.exe 35 PID 2592 wrote to memory of 2852 2592 jce.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe"C:\Users\Admin\AppData\Local\Temp\79a3409077b08f5f71c8d56636b5cbc3205228c73073c2815b7c5b9fc97079d2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Ocean-mQ7Y4U7K9.exe"C:\Users\Admin\AppData\Local\Temp\Ocean-mQ7Y4U7K9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\fzvjiGE3xfl\qqaX6.exeC:\Users\Admin\AppData\Local\Temp\fzvjiGE3xfl\qqaX6.exe Q7Y4U7K93⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
-
C:\Users\Admin\AppData\Local\Temp\jce.exe"C:\Users\Admin\AppData\Local\Temp\jce.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\jce.exe" "jce.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD546888c7235910a21a39b13caa72e6113
SHA173f89ce12e2db6655b08efe4f233a8a05aa94fd7
SHA256ef732471300f0a0d6e0e17f48c20b6e28ae9f5e8fc73b02c1cc3668859b1aed4
SHA51292513026de2ff0cd9eafaaa9d74ae2e8e15f1aa682d1ab5e6d05a357f6b4debb0f146c2f67284ae5eda99ae8ffc6ce99996d944ed155fe4694d6d7d9b4aeaa2a
-
Filesize
7.6MB
MD504119e6b18ad58698adf99a9ee1fce91
SHA11a1c1099bbce911df30fecb8f7f8ed78e22d0318
SHA2561312fb7adee3f7dad51214e1fb78670b64177881d0e60adf74de339960da54b8
SHA5127698fb2ec12291a776e9fd39648d094f62c3c8cef43b6aa900b30d520f316ead179f833b9a1df6bcfe132c637fd62282d2e31881a5f5cbd6c78c9a381d9cf00b
-
Filesize
93KB
MD538696e214ef315d2ba5eb8ca87fd4865
SHA1f87ebc974c10e8954eca76670f00fba4d0b77975
SHA256f51b8a48dc96e4d2e74a86bbde4036eb86646ba44421002075cb2a07c250138c
SHA512dbccffe0e6e2ce840ccaddcb6f2ab5f0d645ac902d84cd073c0d6cae0dbfa7be015889d616c562f86d755e900c5c1715097274a781ba6168b4fbfcac3c23dd4d