Analysis
-
max time kernel
270s -
max time network
267s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
03-12-2024 19:51
Behavioral task
behavioral1
Sample
d.exe
Resource
win10ltsc2021-20241023-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
d.exe
Resource
win11-20241007-en
7 signatures
150 seconds
General
-
Target
d.exe
-
Size
55KB
-
MD5
54f0aa470da2f129138bbced85bb8d75
-
SHA1
d6496182d5087d5371daf67c56b044ab23aee10c
-
SHA256
d00f28b765821f7a58a3ae569c2458d58e94b09bb5ccdaa7d3247b82b338dac2
-
SHA512
8d3615921872a8c8b93fe42e5eb29085498e69de2231a2bf29970c573d29a80cc8aff2bb80e8f070de29e55121d0207cdc18235bcbfc007d0dee88eb9b7bff11
-
SSDEEP
1536:lL+YADn2N29XnfuCCtDCwsNMD7XExI3pmfm:QYADnX9XnmrtDCwsNMD7XExI3pm
Score
10/10
Malware Config
Signatures
-
Njrat family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c08d762111c4d0de5d1ea0b19f45ff7e.exe d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c08d762111c4d0de5d1ea0b19f45ff7e.exe d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c08d762111c4d0de5d1ea0b19f45ff7e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d.exe\" .." d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\c08d762111c4d0de5d1ea0b19f45ff7e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d.exe\" .." d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe 1680 d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe Token: SeIncBasePriorityPrivilege 1680 d.exe Token: 33 1680 d.exe