Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-12-2024 19:51
Behavioral task
behavioral1
Sample
d.exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
d.exe
Resource
win11-20241007-en
windows11-21h2-x64
7 signatures
150 seconds
General
-
Target
d.exe
-
Size
55KB
-
MD5
54f0aa470da2f129138bbced85bb8d75
-
SHA1
d6496182d5087d5371daf67c56b044ab23aee10c
-
SHA256
d00f28b765821f7a58a3ae569c2458d58e94b09bb5ccdaa7d3247b82b338dac2
-
SHA512
8d3615921872a8c8b93fe42e5eb29085498e69de2231a2bf29970c573d29a80cc8aff2bb80e8f070de29e55121d0207cdc18235bcbfc007d0dee88eb9b7bff11
-
SSDEEP
1536:lL+YADn2N29XnfuCCtDCwsNMD7XExI3pmfm:QYADnX9XnmrtDCwsNMD7XExI3pm
Score
10/10
Malware Config
Signatures
-
Njrat family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c08d762111c4d0de5d1ea0b19f45ff7e.exe d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c08d762111c4d0de5d1ea0b19f45ff7e.exe d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\c08d762111c4d0de5d1ea0b19f45ff7e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d.exe\" .." d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\c08d762111c4d0de5d1ea0b19f45ff7e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d.exe\" .." d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe 3700 d.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe Token: 33 3700 d.exe Token: SeIncBasePriorityPrivilege 3700 d.exe