Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 18:52
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
843cc097164266c5c152f19a41fc5be9
-
SHA1
21cda33595dff7a078f2a9c57ddeebc798cb18a3
-
SHA256
3a769894ceb07a4c0e334562acc0d1c3e1523afee2b74bb8f0e794099889b379
-
SHA512
0130baf712d324b65fd60ca83a6e9931ff13c1a520cc40e77ac7222da3939cd258e314a06f8294a85c6f9c693ed79231649752bf1abf8d1e5db14e39632ed915
-
SSDEEP
1536:BWoADn8fLNG/SbrKDD3wsNMDbXExI3pm4Nm:zADncsqbeDD3wsNMDbXExI3pm
Malware Config
Signatures
-
Njrat family
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2696 PING.EXE 2556 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2696 PING.EXE -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2016 Payload.exe Token: 33 2016 Payload.exe Token: SeIncBasePriorityPrivilege 2016 Payload.exe Token: 33 2016 Payload.exe Token: SeIncBasePriorityPrivilege 2016 Payload.exe Token: 33 2016 Payload.exe Token: SeIncBasePriorityPrivilege 2016 Payload.exe Token: 33 2016 Payload.exe Token: SeIncBasePriorityPrivilege 2016 Payload.exe Token: 33 2016 Payload.exe Token: SeIncBasePriorityPrivilege 2016 Payload.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2808 2016 Payload.exe 32 PID 2016 wrote to memory of 2808 2016 Payload.exe 32 PID 2016 wrote to memory of 2808 2016 Payload.exe 32 PID 2016 wrote to memory of 2808 2016 Payload.exe 32 PID 2016 wrote to memory of 2556 2016 Payload.exe 34 PID 2016 wrote to memory of 2556 2016 Payload.exe 34 PID 2016 wrote to memory of 2556 2016 Payload.exe 34 PID 2016 wrote to memory of 2556 2016 Payload.exe 34 PID 2556 wrote to memory of 2696 2556 cmd.exe 36 PID 2556 wrote to memory of 2696 2556 cmd.exe 36 PID 2556 wrote to memory of 2696 2556 cmd.exe 36 PID 2556 wrote to memory of 2696 2556 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2696
-
-