Analysis
-
max time kernel
68s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 16:48
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
6607fcf7763d63e262dc84410bbeb729
-
SHA1
258cd5c203d90cca1362b417c0a6fdfed2a83ca7
-
SHA256
2059f6871d29e0ea9bec89a4af8a117551ea3a3cd844691557bd8804e3af5e2a
-
SHA512
b2dac9364f0cb5183e4259b95d95ffb79fea908606d968f0baeb6be5996c00bccbead2608621edd5601038ce469faa6a2148d603d7f28f68ae7105a5bbe06a43
-
SSDEEP
1536:EmsoDnb4DNQ7SCCHDrwsNMD+XExI3pmAm:YoDnEWOrHDrwsNMD+XExI3pm
Malware Config
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2512 Payload.exe Token: 33 2512 Payload.exe Token: SeIncBasePriorityPrivilege 2512 Payload.exe Token: 33 2512 Payload.exe Token: SeIncBasePriorityPrivilege 2512 Payload.exe Token: 33 2512 Payload.exe Token: SeIncBasePriorityPrivilege 2512 Payload.exe Token: 33 2512 Payload.exe Token: SeIncBasePriorityPrivilege 2512 Payload.exe Token: 33 2512 Payload.exe Token: SeIncBasePriorityPrivilege 2512 Payload.exe Token: 33 2512 Payload.exe Token: SeIncBasePriorityPrivilege 2512 Payload.exe Token: 33 2512 Payload.exe Token: SeIncBasePriorityPrivilege 2512 Payload.exe Token: SeShutdownPrivilege 2772 shutdown.exe Token: SeRemoteShutdownPrivilege 2772 shutdown.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2924 2512 Payload.exe 32 PID 2512 wrote to memory of 2924 2512 Payload.exe 32 PID 2512 wrote to memory of 2924 2512 Payload.exe 32 PID 2512 wrote to memory of 2924 2512 Payload.exe 32 PID 2924 wrote to memory of 2772 2924 cmd.exe 34 PID 2924 wrote to memory of 2772 2924 cmd.exe 34 PID 2924 wrote to memory of 2772 2924 cmd.exe 34 PID 2924 wrote to memory of 2772 2924 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c start shutdown /s /f /t 02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\shutdown.exeshutdown /s /f /t 03⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2936
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2324