Analysis
-
max time kernel
66s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 16:48
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
6607fcf7763d63e262dc84410bbeb729
-
SHA1
258cd5c203d90cca1362b417c0a6fdfed2a83ca7
-
SHA256
2059f6871d29e0ea9bec89a4af8a117551ea3a3cd844691557bd8804e3af5e2a
-
SHA512
b2dac9364f0cb5183e4259b95d95ffb79fea908606d968f0baeb6be5996c00bccbead2608621edd5601038ce469faa6a2148d603d7f28f68ae7105a5bbe06a43
-
SSDEEP
1536:EmsoDnb4DNQ7SCCHDrwsNMD+XExI3pmAm:YoDnEWOrHDrwsNMD+XExI3pm
Malware Config
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "194" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 316 Payload.exe Token: 33 316 Payload.exe Token: SeIncBasePriorityPrivilege 316 Payload.exe Token: 33 316 Payload.exe Token: SeIncBasePriorityPrivilege 316 Payload.exe Token: 33 316 Payload.exe Token: SeIncBasePriorityPrivilege 316 Payload.exe Token: 33 316 Payload.exe Token: SeIncBasePriorityPrivilege 316 Payload.exe Token: 33 316 Payload.exe Token: SeIncBasePriorityPrivilege 316 Payload.exe Token: 33 316 Payload.exe Token: SeIncBasePriorityPrivilege 316 Payload.exe Token: 33 316 Payload.exe Token: SeIncBasePriorityPrivilege 316 Payload.exe Token: SeShutdownPrivilege 1712 shutdown.exe Token: SeRemoteShutdownPrivilege 1712 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3104 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 316 wrote to memory of 4992 316 Payload.exe 102 PID 316 wrote to memory of 4992 316 Payload.exe 102 PID 316 wrote to memory of 4992 316 Payload.exe 102 PID 4992 wrote to memory of 1712 4992 cmd.exe 104 PID 4992 wrote to memory of 1712 4992 cmd.exe 104 PID 4992 wrote to memory of 1712 4992 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.execmd /c start shutdown /s /f /t 02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\shutdown.exeshutdown /s /f /t 03⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38d6855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3104