Analysis
-
max time kernel
129s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 18:56
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20241023-en
windows7-x64
8 signatures
150 seconds
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
843cc097164266c5c152f19a41fc5be9
-
SHA1
21cda33595dff7a078f2a9c57ddeebc798cb18a3
-
SHA256
3a769894ceb07a4c0e334562acc0d1c3e1523afee2b74bb8f0e794099889b379
-
SHA512
0130baf712d324b65fd60ca83a6e9931ff13c1a520cc40e77ac7222da3939cd258e314a06f8294a85c6f9c693ed79231649752bf1abf8d1e5db14e39632ed915
-
SSDEEP
1536:BWoADn8fLNG/SbrKDD3wsNMDbXExI3pm4Nm:zADncsqbeDD3wsNMDbXExI3pm
Malware Config
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4176 cmd.exe 1284 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1284 PING.EXE -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe Token: 33 1816 Payload.exe Token: SeIncBasePriorityPrivilege 1816 Payload.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1816 wrote to memory of 3936 1816 Payload.exe 91 PID 1816 wrote to memory of 3936 1816 Payload.exe 91 PID 1816 wrote to memory of 3936 1816 Payload.exe 91 PID 1816 wrote to memory of 4176 1816 Payload.exe 93 PID 1816 wrote to memory of 4176 1816 Payload.exe 93 PID 1816 wrote to memory of 4176 1816 Payload.exe 93 PID 4176 wrote to memory of 1284 4176 cmd.exe 95 PID 4176 wrote to memory of 1284 4176 cmd.exe 95 PID 4176 wrote to memory of 1284 4176 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1284
-
-