Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 03:10
Behavioral task
behavioral1
Sample
9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe
Resource
win10v2004-20241007-en
General
-
Target
9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe
-
Size
65KB
-
MD5
91a3beadd3ccb440e41ee4ee7e8ed9bc
-
SHA1
4d477640c72e12103c54900c793601c67c520c6f
-
SHA256
9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e
-
SHA512
f78c26e3598b08f79151e5605ea1b9be23154729c1c4d871d41c65450001e512474fcc294f934eee6d68e82ebc70ad14ed25b5f8c087d21d37892501f17b2f3a
-
SSDEEP
1536:zWnyCIUoN36tXQviFw1IssUBnvAQIfLteF3nLrB9z3nQaF9bES9vMO:zWnyCIUoN36tXQviFCbRBnNIfWl9zAaB
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:13943
discord.exe
-
reg_key
discord.exe
-
splitter
|Ghost|
Signatures
-
Njrat family
-
Deletes itself 1 IoCs
pid Process 1856 cmd.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\discord.exe discord.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\discord.exe discord.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\discord.url discord.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 discord.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\discord.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\discord.exe\" .." discord.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\discord.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\discord.exe\" .." discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe Token: 33 1748 discord.exe Token: SeIncBasePriorityPrivilege 1748 discord.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1748 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 30 PID 2192 wrote to memory of 1748 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 30 PID 2192 wrote to memory of 1748 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 30 PID 2192 wrote to memory of 1748 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 30 PID 2192 wrote to memory of 1856 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 31 PID 2192 wrote to memory of 1856 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 31 PID 2192 wrote to memory of 1856 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 31 PID 2192 wrote to memory of 1856 2192 9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe 31 PID 1856 wrote to memory of 1852 1856 cmd.exe 33 PID 1856 wrote to memory of 1852 1856 cmd.exe 33 PID 1856 wrote to memory of 1852 1856 cmd.exe 33 PID 1856 wrote to memory of 1852 1856 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe"C:\Users\Admin\AppData\Local\Temp\9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\discord.exe"C:\Users\Admin\AppData\Local\Temp\discord.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\9fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 53⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD591a3beadd3ccb440e41ee4ee7e8ed9bc
SHA14d477640c72e12103c54900c793601c67c520c6f
SHA2569fe2bbc019db8543d35a9871df964a8c47345a19426d106894b8ef4f07f1e27e
SHA512f78c26e3598b08f79151e5605ea1b9be23154729c1c4d871d41c65450001e512474fcc294f934eee6d68e82ebc70ad14ed25b5f8c087d21d37892501f17b2f3a