Analysis
-
max time kernel
419s -
max time network
420s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 07:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
spam_discord.exe
Resource
win7-20240903-en
8 signatures
600 seconds
General
-
Target
spam_discord.exe
-
Size
33KB
-
MD5
ae8f6efb07eca4eddd606257a09db80d
-
SHA1
1aec86f9a257129e92328cc499788ef9d634dbfd
-
SHA256
56cb9a9aba2aa8d2ffa070fc15524cc0d4cb4b971cfd4f2c5fd089f18a9159bf
-
SHA512
05e0baa914947c9ac8cd29dcc7f374e4935167ee8a1c60ddf894a799bd9d7d7d0ae266e4ca64b06e5bf0411a36b558be1942763e349580c9929079a51d59c3a4
-
SSDEEP
768:VvTRf6qjU4X10zbvQX0O7yOCPijnXkWebNiPVSRiR:tRf6qjV1Qbv60O75CKjkWUG4y
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
127.0.0.1:5552
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|'|'|
Signatures
-
Njrat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spam_discord.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 772 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\spam_discord.exe"C:\Users\Admin\AppData\Local\Temp\spam_discord.exe"1⤵
- Modifies registry class
PID:1624
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:772