Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-12-2024 11:11
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
3718f276b92111f2efad4aa86b017604
-
SHA1
8db8f30eff1e3faf6440f5f613aecf571a2f501e
-
SHA256
5cae24059c7bdeb3e62e748a8f7d8c7165bbf2e46adace7f28e40e7637793d51
-
SHA512
38b55da47bf56646c4a985413fa1a789982047aff7ae3d1ee576d9cfa567a87da8be8a3ba9a5fc5ca6d8d673091728c2fad119d118c40b6fcd3e3847a42299c8
-
SSDEEP
768:/+iyFut1MankI2N9hi8QR3Q0kSN7mwFvfu0YMDHPsAL7XJSxI3pmQm:/+F8Dn2N9hi8KdDywsNMDDXExI3pmQm
Malware Config
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3160 cmd.exe 1584 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1584 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3772 Payload.exe Token: 33 3772 Payload.exe Token: SeIncBasePriorityPrivilege 3772 Payload.exe Token: 33 3772 Payload.exe Token: SeIncBasePriorityPrivilege 3772 Payload.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3772 wrote to memory of 2280 3772 Payload.exe 89 PID 3772 wrote to memory of 2280 3772 Payload.exe 89 PID 3772 wrote to memory of 2280 3772 Payload.exe 89 PID 3772 wrote to memory of 3160 3772 Payload.exe 91 PID 3772 wrote to memory of 3160 3772 Payload.exe 91 PID 3772 wrote to memory of 3160 3772 Payload.exe 91 PID 3160 wrote to memory of 1584 3160 cmd.exe 93 PID 3160 wrote to memory of 1584 3160 cmd.exe 93 PID 3160 wrote to memory of 1584 3160 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1584
-
-