Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 16:46
Behavioral task
behavioral1
Sample
5c3d5da03554ca31fcc35d3ee1e967d8.exe
Resource
win7-20240903-en
General
-
Target
5c3d5da03554ca31fcc35d3ee1e967d8.exe
-
Size
55KB
-
MD5
5c3d5da03554ca31fcc35d3ee1e967d8
-
SHA1
9fb31b712fedbeb58fe43a15321a19d56835c970
-
SHA256
6b9a569e08e67121fce97dc7aadd0286ce29a1858d5b551c2f5133bd65e9e2a0
-
SHA512
9ef2b911416f53796d84f5237c4a0136f2cf802f2f469d43d6b182f887bddba81fb36fcc2ed79e1456c4eb21fc9cb1bdc015e4b2ef788952250a05a0ac34b505
-
SSDEEP
1536:tzpMDnE4uNRty4XXzdhDmwsNMDAXExI3pm/m:bMDnlYk4XxhDmwsNMDAXExI3pm
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
area-paid.gl.at.ply.gg:37212
59211d537036a82f5e7ec159326cddf1
-
reg_key
59211d537036a82f5e7ec159326cddf1
-
splitter
Y262SUCZ4UJJ
Signatures
-
Njrat family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 3448 5c3d5da03554ca31fcc35d3ee1e967d8.exe 1552 5c3d5da03554ca31fcc35d3ee1e967d8.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3d5da03554ca31fcc35d3ee1e967d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3d5da03554ca31fcc35d3ee1e967d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3d5da03554ca31fcc35d3ee1e967d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4892 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3376 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: 33 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe Token: SeIncBasePriorityPrivilege 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3264 wrote to memory of 3924 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 93 PID 3264 wrote to memory of 3924 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 93 PID 3264 wrote to memory of 3924 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 93 PID 3264 wrote to memory of 836 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 95 PID 3264 wrote to memory of 836 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 95 PID 3264 wrote to memory of 836 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 95 PID 3264 wrote to memory of 3376 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 97 PID 3264 wrote to memory of 3376 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 97 PID 3264 wrote to memory of 3376 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 97 PID 3264 wrote to memory of 536 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 99 PID 3264 wrote to memory of 536 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 99 PID 3264 wrote to memory of 536 3264 5c3d5da03554ca31fcc35d3ee1e967d8.exe 99 PID 536 wrote to memory of 4892 536 cmd.exe 101 PID 536 wrote to memory of 4892 536 cmd.exe 101 PID 536 wrote to memory of 4892 536 cmd.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3924 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe"C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3376
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\reg.exereg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exeC:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3448
-
C:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exeC:\Users\Admin\AppData\Local\Temp\5c3d5da03554ca31fcc35d3ee1e967d8.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\5c3d5da03554ca31fcc35d3ee1e967d8.exe.log
Filesize319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
Filesize
55KB
MD55c3d5da03554ca31fcc35d3ee1e967d8
SHA19fb31b712fedbeb58fe43a15321a19d56835c970
SHA2566b9a569e08e67121fce97dc7aadd0286ce29a1858d5b551c2f5133bd65e9e2a0
SHA5129ef2b911416f53796d84f5237c4a0136f2cf802f2f469d43d6b182f887bddba81fb36fcc2ed79e1456c4eb21fc9cb1bdc015e4b2ef788952250a05a0ac34b505