Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 16:46
Behavioral task
behavioral1
Sample
5c3d5da03554ca31fcc35d3ee1e967d8.exe
Resource
win7-20240903-en
General
-
Target
5c3d5da03554ca31fcc35d3ee1e967d8.exe
-
Size
55KB
-
MD5
5c3d5da03554ca31fcc35d3ee1e967d8
-
SHA1
9fb31b712fedbeb58fe43a15321a19d56835c970
-
SHA256
6b9a569e08e67121fce97dc7aadd0286ce29a1858d5b551c2f5133bd65e9e2a0
-
SHA512
9ef2b911416f53796d84f5237c4a0136f2cf802f2f469d43d6b182f887bddba81fb36fcc2ed79e1456c4eb21fc9cb1bdc015e4b2ef788952250a05a0ac34b505
-
SSDEEP
1536:tzpMDnE4uNRty4XXzdhDmwsNMDAXExI3pm/m:bMDnlYk4XxhDmwsNMDAXExI3pm
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
area-paid.gl.at.ply.gg:37212
59211d537036a82f5e7ec159326cddf1
-
reg_key
59211d537036a82f5e7ec159326cddf1
-
splitter
Y262SUCZ4UJJ
Signatures
-
Njrat family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2704 5c3d5da03554ca31fcc35d3ee1e967d8.exe 764 5c3d5da03554ca31fcc35d3ee1e967d8.exe 1208 5c3d5da03554ca31fcc35d3ee1e967d8.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3d5da03554ca31fcc35d3ee1e967d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3d5da03554ca31fcc35d3ee1e967d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3d5da03554ca31fcc35d3ee1e967d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3d5da03554ca31fcc35d3ee1e967d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1968 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2244 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1984 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 28 PID 1636 wrote to memory of 1984 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 28 PID 1636 wrote to memory of 1984 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 28 PID 1636 wrote to memory of 1984 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 28 PID 1636 wrote to memory of 2008 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 30 PID 1636 wrote to memory of 2008 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 30 PID 1636 wrote to memory of 2008 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 30 PID 1636 wrote to memory of 2008 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 30 PID 1636 wrote to memory of 2244 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 32 PID 1636 wrote to memory of 2244 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 32 PID 1636 wrote to memory of 2244 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 32 PID 1636 wrote to memory of 2244 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 32 PID 1636 wrote to memory of 2936 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 34 PID 1636 wrote to memory of 2936 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 34 PID 1636 wrote to memory of 2936 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 34 PID 1636 wrote to memory of 2936 1636 5c3d5da03554ca31fcc35d3ee1e967d8.exe 34 PID 2936 wrote to memory of 1968 2936 cmd.exe 36 PID 2936 wrote to memory of 1968 2936 cmd.exe 36 PID 2936 wrote to memory of 1968 2936 cmd.exe 36 PID 2936 wrote to memory of 1968 2936 cmd.exe 36 PID 2072 wrote to memory of 2704 2072 taskeng.exe 40 PID 2072 wrote to memory of 2704 2072 taskeng.exe 40 PID 2072 wrote to memory of 2704 2072 taskeng.exe 40 PID 2072 wrote to memory of 2704 2072 taskeng.exe 40 PID 2072 wrote to memory of 764 2072 taskeng.exe 41 PID 2072 wrote to memory of 764 2072 taskeng.exe 41 PID 2072 wrote to memory of 764 2072 taskeng.exe 41 PID 2072 wrote to memory of 764 2072 taskeng.exe 41 PID 2072 wrote to memory of 1208 2072 taskeng.exe 42 PID 2072 wrote to memory of 1208 2072 taskeng.exe 42 PID 2072 wrote to memory of 1208 2072 taskeng.exe 42 PID 2072 wrote to memory of 1208 2072 taskeng.exe 42 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1984 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe"C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1984
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2244
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\reg.exereg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1968
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {734BB72A-F8C7-423B-8F2A-D92736CE6C82} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exeC:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exeC:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exeC:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD55c3d5da03554ca31fcc35d3ee1e967d8
SHA19fb31b712fedbeb58fe43a15321a19d56835c970
SHA2566b9a569e08e67121fce97dc7aadd0286ce29a1858d5b551c2f5133bd65e9e2a0
SHA5129ef2b911416f53796d84f5237c4a0136f2cf802f2f469d43d6b182f887bddba81fb36fcc2ed79e1456c4eb21fc9cb1bdc015e4b2ef788952250a05a0ac34b505