Analysis
-
max time kernel
102s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/11/2024, 05:38
Behavioral task
behavioral1
Sample
55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe
Resource
win10v2004-20241007-en
General
-
Target
55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe
-
Size
23KB
-
MD5
b85baddd22e915e5e427ce5c04ed4b70
-
SHA1
9af824c64e4675e0e3ecd5bf7e3f4c9d158e7b0f
-
SHA256
55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40
-
SHA512
7c48b9b348b79416d6e16895b298c64f15b0eba1bd42c36c3368236615afdc90f742513e9a6000dae9a677e2d82e4b3d1ef8b5669655fd84c0ea7733c9a40632
-
SSDEEP
384:dI2SUCoQ3XgUzwsGCw5zSEZJgA6hgHpFChrV1mRvR6JZlbw8hqIusZzZxO:CNnzdwk8Rpcnur
Malware Config
Extracted
njrat
0.7d
666
10.0.241.51:5552
def55e13478210d122a75775a8344a1e
-
reg_key
def55e13478210d122a75775a8344a1e
-
splitter
|'|'|
Signatures
-
Njrat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2688 AcroRd32.exe 2688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2516 2504 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe 30 PID 2504 wrote to memory of 2516 2504 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe 30 PID 2504 wrote to memory of 2516 2504 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe 30 PID 2504 wrote to memory of 2516 2504 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe 30 PID 2504 wrote to memory of 2516 2504 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe 30 PID 2504 wrote to memory of 2516 2504 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe 30 PID 2504 wrote to memory of 2516 2504 55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe 30 PID 2516 wrote to memory of 2688 2516 rundll32.exe 31 PID 2516 wrote to memory of 2688 2516 rundll32.exe 31 PID 2516 wrote to memory of 2688 2516 rundll32.exe 31 PID 2516 wrote to memory of 2688 2516 rundll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe"C:\Users\Admin\AppData\Local\Temp\55b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cc1232⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cc123"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5b85baddd22e915e5e427ce5c04ed4b70
SHA19af824c64e4675e0e3ecd5bf7e3f4c9d158e7b0f
SHA25655b0b958e1fc9c123568c382b1a0404326eb227155ff76367a2d49c33d92ea40
SHA5127c48b9b348b79416d6e16895b298c64f15b0eba1bd42c36c3368236615afdc90f742513e9a6000dae9a677e2d82e4b3d1ef8b5669655fd84c0ea7733c9a40632
-
Filesize
3KB
MD5c420bd4646e73f610ab744d17be33152
SHA19399ee90fe633428af140e692e3384ba1e672bb8
SHA256e0df4c01c157f4401f45f453dcd776bd5855299fb9c2980e38a2e9e12933996a
SHA5125c1a8860e8126c97f254f6a0ab2d13d13cecf720fb4bd6ba8670a2ed18951e6db6113a9ec426885739aba282c29d12c6b8bb12e09b16fc22f2775b09cdd647c2