Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 20:12
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10v2004-20241007-en
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
29a02cd1fb2226905da5a34ac62595b9
-
SHA1
a0c85edb2b9decb53291485acd64f36dbf5a6999
-
SHA256
7aca902f9e7493dbf4f53a4cd3a4a9e5858eb825ef0141bf2e30150b416a070e
-
SHA512
2e3000bdf30fe332f2923563a5266ada0201473fa999382aeced2cbb09951179ed2e7278314b97e1852dc8e300cd182632481f508f65b4aa629beecdb14993b3
-
SSDEEP
1536:1KksDnHNwZ8Cam8LDdwsNMD2XExI3pmym:fsDn6SKiDdwsNMD2XExI3pm
Malware Config
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Payload.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba504e39d49d09ba3f0b71067d651692.exe Payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba504e39d49d09ba3f0b71067d651692.exe Payload.exe -
Executes dropped EXE 13 IoCs
pid Process 1068 93373ffcf5244c479a2326a27876486f.exe 4996 9051c56c718341e196246757aaf29c12.exe 3884 5823c0c0be924dfbbf49f85207c6c28c.exe 4824 1a4a60f5115e4f2194fd06da0658c729.exe 2600 497ee096f1bc4f1da75e3708b37f3e35.exe 640 07bbcb705b0543349c0102f60b1ae6be.exe 4504 3231957331c14d69917317eb948da566.exe 4060 1a38b92c54174dd9883868df165f839d.exe 1512 8e7a3895cb19450fa4d8da54f1233577.exe 3084 a47e3c5ac7b64aad98c540c582e207e3.exe 3204 0c1ebf7928324769be0b9fd52afda119.exe 2876 6c12012f74c7451fb020544a98f1bdf2.exe 4088 eb3b3c06acc0416eb9413f17929a9d7a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ba504e39d49d09ba3f0b71067d651692 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe\" .." Payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ba504e39d49d09ba3f0b71067d651692 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe\" .." Payload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe 4400 Payload.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4140 AUDIODG.EXE Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe Token: 33 4400 Payload.exe Token: SeIncBasePriorityPrivilege 4400 Payload.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1068 4400 Payload.exe 98 PID 4400 wrote to memory of 1068 4400 Payload.exe 98 PID 4400 wrote to memory of 4996 4400 Payload.exe 103 PID 4400 wrote to memory of 4996 4400 Payload.exe 103 PID 4400 wrote to memory of 3884 4400 Payload.exe 105 PID 4400 wrote to memory of 3884 4400 Payload.exe 105 PID 4400 wrote to memory of 4824 4400 Payload.exe 106 PID 4400 wrote to memory of 4824 4400 Payload.exe 106 PID 4400 wrote to memory of 2600 4400 Payload.exe 108 PID 4400 wrote to memory of 2600 4400 Payload.exe 108 PID 4400 wrote to memory of 640 4400 Payload.exe 111 PID 4400 wrote to memory of 640 4400 Payload.exe 111 PID 4400 wrote to memory of 4504 4400 Payload.exe 113 PID 4400 wrote to memory of 4504 4400 Payload.exe 113 PID 4400 wrote to memory of 4060 4400 Payload.exe 115 PID 4400 wrote to memory of 4060 4400 Payload.exe 115 PID 4400 wrote to memory of 1512 4400 Payload.exe 117 PID 4400 wrote to memory of 1512 4400 Payload.exe 117 PID 4400 wrote to memory of 3084 4400 Payload.exe 118 PID 4400 wrote to memory of 3084 4400 Payload.exe 118 PID 4400 wrote to memory of 3204 4400 Payload.exe 119 PID 4400 wrote to memory of 3204 4400 Payload.exe 119 PID 4400 wrote to memory of 2876 4400 Payload.exe 120 PID 4400 wrote to memory of 2876 4400 Payload.exe 120 PID 4400 wrote to memory of 4088 4400 Payload.exe 122 PID 4400 wrote to memory of 4088 4400 Payload.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\93373ffcf5244c479a2326a27876486f.exe"C:\Users\Admin\AppData\Local\Temp\93373ffcf5244c479a2326a27876486f.exe"2⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\9051c56c718341e196246757aaf29c12.exe"C:\Users\Admin\AppData\Local\Temp\9051c56c718341e196246757aaf29c12.exe"2⤵
- Executes dropped EXE
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\5823c0c0be924dfbbf49f85207c6c28c.exe"C:\Users\Admin\AppData\Local\Temp\5823c0c0be924dfbbf49f85207c6c28c.exe"2⤵
- Executes dropped EXE
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\1a4a60f5115e4f2194fd06da0658c729.exe"C:\Users\Admin\AppData\Local\Temp\1a4a60f5115e4f2194fd06da0658c729.exe"2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\497ee096f1bc4f1da75e3708b37f3e35.exe"C:\Users\Admin\AppData\Local\Temp\497ee096f1bc4f1da75e3708b37f3e35.exe"2⤵
- Executes dropped EXE
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\07bbcb705b0543349c0102f60b1ae6be.exe"C:\Users\Admin\AppData\Local\Temp\07bbcb705b0543349c0102f60b1ae6be.exe"2⤵
- Executes dropped EXE
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\3231957331c14d69917317eb948da566.exe"C:\Users\Admin\AppData\Local\Temp\3231957331c14d69917317eb948da566.exe"2⤵
- Executes dropped EXE
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\1a38b92c54174dd9883868df165f839d.exe"C:\Users\Admin\AppData\Local\Temp\1a38b92c54174dd9883868df165f839d.exe"2⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\8e7a3895cb19450fa4d8da54f1233577.exe"C:\Users\Admin\AppData\Local\Temp\8e7a3895cb19450fa4d8da54f1233577.exe"2⤵
- Executes dropped EXE
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\a47e3c5ac7b64aad98c540c582e207e3.exe"C:\Users\Admin\AppData\Local\Temp\a47e3c5ac7b64aad98c540c582e207e3.exe"2⤵
- Executes dropped EXE
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\0c1ebf7928324769be0b9fd52afda119.exe"C:\Users\Admin\AppData\Local\Temp\0c1ebf7928324769be0b9fd52afda119.exe"2⤵
- Executes dropped EXE
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\6c12012f74c7451fb020544a98f1bdf2.exe"C:\Users\Admin\AppData\Local\Temp\6c12012f74c7451fb020544a98f1bdf2.exe"2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\eb3b3c06acc0416eb9413f17929a9d7a.exe"C:\Users\Admin\AppData\Local\Temp\eb3b3c06acc0416eb9413f17929a9d7a.exe"2⤵
- Executes dropped EXE
PID:4088
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c 0x3181⤵
- Suspicious use of AdjustPrivilegeToken
PID:4140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
594B
MD544e889763d548d09132c31ed548f63f5
SHA1d9829a1b5841338533a0be0509df50172cce73be
SHA256d29f0e5fe1ab31998f200d4441c0e201a2e3bd6e416f638cbee2eb55354d48cc
SHA512a1474aaef1132f459e8139157a618368c7623f4a25a754c6fc2672d92929b9506bfcc272eebf5c69901f4140d36e740f5f6bbfb90e000c6538ab492f5aa48a96
-
Filesize
997KB
MD528aaac578be4ce06cb695e4f927b4302
SHA1880ab0560b81e05e920f9ec1d6c0ecf5e04eaa7e
SHA2568929d3b749ff91527b8e407eff6bde4bb0bb27739313b5c0db0434cbf700dbfc
SHA512068698bda0543c773b36830f6760456e40e9046d9d20089ad88cb646ef5c7bd6c6716c6d59cfc7abd5bffb9129f5a7076e2f9c9b321795f224923f00b7b91374