Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 07:14
General
-
Target
Dllhot.exe
-
Size
43KB
-
MD5
4dff5df7e710ae25c9defee573ed0fa3
-
SHA1
b3f08b7a5a6b221282c6e43bed12fceb15aaac4e
-
SHA256
a20f1315607ef8663239d4c9e07dbcd02e27e5710743bb0879c29ae12d198729
-
SHA512
ce6aee99656826dc610540a6788bdb9c459a8b53e3d4fc34f029caa6ceaec03d1f3585fc89c329df51b11a9d2b9cd15f801a56801fb6a69d99c3f30a98978ced
-
SSDEEP
384:8ZyX1Cj8syWdppUwwReEjM6JEAfHz8Iij+ZsNO3PlpJKkkjh/TzF7pWnJmgreT0I:6s04pWXpUBXM6jNuXQ/okC+L
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
HacKed
C2
saw-shirts.gl.at.ply.gg:4164
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dllhot.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dllhot.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Dllhot.exepid Process 2896 Dllhot.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Dllhot.exedescription pid Process Token: SeDebugPrivilege 2896 Dllhot.exe Token: 33 2896 Dllhot.exe Token: SeIncBasePriorityPrivilege 2896 Dllhot.exe