Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 19:57
Behavioral task
behavioral1
Sample
d.exe
Resource
win7-20240729-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
d.exe
Resource
win10v2004-20241007-en
7 signatures
150 seconds
General
-
Target
d.exe
-
Size
55KB
-
MD5
54f0aa470da2f129138bbced85bb8d75
-
SHA1
d6496182d5087d5371daf67c56b044ab23aee10c
-
SHA256
d00f28b765821f7a58a3ae569c2458d58e94b09bb5ccdaa7d3247b82b338dac2
-
SHA512
8d3615921872a8c8b93fe42e5eb29085498e69de2231a2bf29970c573d29a80cc8aff2bb80e8f070de29e55121d0207cdc18235bcbfc007d0dee88eb9b7bff11
-
SSDEEP
1536:lL+YADn2N29XnfuCCtDCwsNMD7XExI3pmfm:QYADnX9XnmrtDCwsNMD7XExI3pm
Score
10/10
Malware Config
Signatures
-
Njrat family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c08d762111c4d0de5d1ea0b19f45ff7e.exe d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c08d762111c4d0de5d1ea0b19f45ff7e.exe d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\c08d762111c4d0de5d1ea0b19f45ff7e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d.exe\" .." d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\c08d762111c4d0de5d1ea0b19f45ff7e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d.exe\" .." d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe 2240 d.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe Token: 33 2240 d.exe Token: SeIncBasePriorityPrivilege 2240 d.exe