Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe
Resource
win10v2004-20241007-en
General
-
Target
7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe
-
Size
49KB
-
MD5
272e00ed89a593d788dc6454d7f2c0f4
-
SHA1
e6a6c8f32c83267523cf0bb2c946663c4912264c
-
SHA256
7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d
-
SHA512
87e6fa2422ce62b9123702b90968168a3512ddc6551ece3327fa82d680a1d5f7e466d95e796f9a9c150f32dddd35628b1a9be3afb01c9b4ac17d454dc1277eb2
-
SSDEEP
1536:M8blGZjjDoEzPOfpB8KKRhHwzptAN+NJ6nXMcemhuhyn:M8bAzPOIbPHwzYN+NTdhyn
Malware Config
Extracted
njrat
0.7d
MAL
12e1212:8888
66e263e765a8ecf009ff45b8a895efff
-
reg_key
66e263e765a8ecf009ff45b8a895efff
-
splitter
|'|'|
Signatures
-
Njrat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2568 2236 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe 29 PID 2236 wrote to memory of 2568 2236 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe 29 PID 2236 wrote to memory of 2568 2236 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe 29 PID 2236 wrote to memory of 2568 2236 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe 29 PID 2236 wrote to memory of 2568 2236 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe 29 PID 2236 wrote to memory of 2568 2236 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe 29 PID 2236 wrote to memory of 2568 2236 7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe 29 PID 2568 wrote to memory of 2760 2568 rundll32.exe 30 PID 2568 wrote to memory of 2760 2568 rundll32.exe 30 PID 2568 wrote to memory of 2760 2568 rundll32.exe 30 PID 2568 wrote to memory of 2760 2568 rundll32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe"C:\Users\Admin\AppData\Local\Temp\7190d2d0d312dbcff88983c0fd93b0100af1fc880dea847aba35188e3465c81d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Server.exe������������������������2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Server.exe������������������������"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD52458e6f4d38ea15f21d61353648b2324
SHA14f0ef95fc6ebad94749edbd2cec4fb10982db300
SHA256e599bb402c73eec1cde52b6cbf459201f64206b509d0437176e9c12ebcecff50
SHA512da838e635c7cc35e1c4957824569b6d4ddfa8b19f91b8d46e26cba3483c2a18fd858f6b51e8a0907d7285beb387b42f04c93826885b2c11c5dddd14d4b7376e5
-
Filesize
3KB
MD5ddd6923e0eca25b1f3d3056dc68539fa
SHA179771f60a6e421083b373e2fa3b19260fd970044
SHA2565debb6dfe147957faac4d28c72483b14a2c508a8fbe5a6cddec768cba2794fcf
SHA512497989cf6a97b40694ef7d2b217d89df800722ac590bd2f79c9826ce5383212296b8b47de6ea6a173e0ed5612f78c69feba254720fd961f37985242079ece5ab