Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe
Resource
win10v2004-20241007-en
General
-
Target
cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe
-
Size
1.7MB
-
MD5
b0dc514d703c941c8f2a0301611d40fc
-
SHA1
24e11b8026836601b58c6c5669edbea8c5cd5704
-
SHA256
cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310
-
SHA512
8db960f7868bc6cf31ec9fb5542df3c72dc43f74ac26e68d349700a91e34427cde463337f7e3bf1e0a2fdde952e2c535304c0f7aa6c8105ab3ce3b9edd2b4fea
-
SSDEEP
49152:95JYY7I66osv7LysFBAmsx0Rbt0FPTudDO:pYYbrsCsFnH0F72DO
Malware Config
Extracted
njrat
im523
strangerjack
127.0.0.1:6666
11449a6d98419174eacab32de56c3d2c
-
reg_key
11449a6d98419174eacab32de56c3d2c
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4700 netsh.exe -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/384-1-0x0000000000F00000-0x00000000010BC000-memory.dmp net_reactor -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: 33 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe Token: SeIncBasePriorityPrivilege 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 384 wrote to memory of 4700 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe 92 PID 384 wrote to memory of 4700 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe 92 PID 384 wrote to memory of 4700 384 cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe"C:\Users\Admin\AppData\Local\Temp\cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe" "cd1bf46e23edc59c8ede6605c0c090ce9e82e9ae5160e3bd85238d23f784c310.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4700
-