Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-10-2024 18:15
Behavioral task
behavioral1
Sample
e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe
Resource
win10v2004-20241007-en
General
-
Target
e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe
-
Size
43KB
-
MD5
b5fbad1ebd0c1f721b6bedaad5aed9f0
-
SHA1
a55cecffa5d90aeb5938e81b22c6ce68797f41ab
-
SHA256
e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9
-
SHA512
1d73ba203ff123f9284d6cbe6ba0184c3af05f8018be6d8d1ec3de7fc52dd5e0f12e97fa5a9ad6a83a23828429331de95728dec208651d3f860744343fb16855
-
SSDEEP
384:WZy+x7q1STss7yKStZ9gQ8ExUZS2azsIij+ZsNO3PlpJKkkjh/TzF7pWn5TgreTf:MZGk4smKS39xNU0zuXQ/o8D+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
colara 2.9
127.0.0.1:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exepid Process 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exedescription pid Process Token: SeDebugPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: 33 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe Token: SeIncBasePriorityPrivilege 2640 e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe"C:\Users\Admin\AppData\Local\Temp\e2bf3d37ddf4f4db311467cbeaab0e7b1c217e53fa313861b987da2402542df9N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2640