Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 18:56
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20241023-en
windows7-x64
8 signatures
150 seconds
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
843cc097164266c5c152f19a41fc5be9
-
SHA1
21cda33595dff7a078f2a9c57ddeebc798cb18a3
-
SHA256
3a769894ceb07a4c0e334562acc0d1c3e1523afee2b74bb8f0e794099889b379
-
SHA512
0130baf712d324b65fd60ca83a6e9931ff13c1a520cc40e77ac7222da3939cd258e314a06f8294a85c6f9c693ed79231649752bf1abf8d1e5db14e39632ed915
-
SSDEEP
1536:BWoADn8fLNG/SbrKDD3wsNMDbXExI3pm4Nm:zADncsqbeDD3wsNMDbXExI3pm
Malware Config
Signatures
-
Njrat family
-
Deletes itself 1 IoCs
pid Process 1224 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1224 cmd.exe 1892 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1892 PING.EXE -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe Token: 33 2764 Payload.exe Token: SeIncBasePriorityPrivilege 2764 Payload.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1728 2764 Payload.exe 32 PID 2764 wrote to memory of 1728 2764 Payload.exe 32 PID 2764 wrote to memory of 1728 2764 Payload.exe 32 PID 2764 wrote to memory of 1728 2764 Payload.exe 32 PID 2764 wrote to memory of 1224 2764 Payload.exe 34 PID 2764 wrote to memory of 1224 2764 Payload.exe 34 PID 2764 wrote to memory of 1224 2764 Payload.exe 34 PID 2764 wrote to memory of 1224 2764 Payload.exe 34 PID 1224 wrote to memory of 1892 1224 cmd.exe 36 PID 1224 wrote to memory of 1892 1224 cmd.exe 36 PID 1224 wrote to memory of 1892 1224 cmd.exe 36 PID 1224 wrote to memory of 1892 1224 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1892
-
-