Analysis
-
max time kernel
32s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 13:10
General
-
Target
SharkHack.exe
-
Size
3.9MB
-
MD5
1132637cde57bdbd23fd05694713fb94
-
SHA1
1625fe2acadbc9c8a400c69e1ca7e8afd97b56eb
-
SHA256
5cdc56dfe73c53516cb619f44147b0f8535ab68575a8071008ad59599d5c1cb6
-
SHA512
65bd5fdb631b33964038b972d71a4d17fa8290b3a2052fd88097e66e7a3af6fa0a7f8e1cde0ebe5867c6b5e8e923f1f6143f6f9d2dc4a0770fb785238d1f130f
-
SSDEEP
49152:SFnCO88whwjbAlR/6QhDEvebZVLRbjgQjzK5ppnrLn6XBSOvdsW:9hTbDzhfgQSp9LSBnvdsW
Malware Config
Signatures
-
Njrat family
-
Executes dropped EXE 3 IoCs
pid Process 4164 SharkHack1.exe 3548 virus.exe 3032 sharkhack.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SharkHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sharkhack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe -
Kills process with taskkill 4 IoCs
pid Process 4472 TASKKILL.exe 3884 TASKKILL.exe 752 TASKKILL.exe 3964 TASKKILL.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe 3548 virus.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3548 virus.exe Token: SeDebugPrivilege 3884 TASKKILL.exe Token: SeDebugPrivilege 4472 TASKKILL.exe Token: SeDebugPrivilege 3032 sharkhack.exe Token: SeDebugPrivilege 752 TASKKILL.exe Token: SeDebugPrivilege 3964 TASKKILL.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 912 wrote to memory of 4164 912 SharkHack.exe 77 PID 912 wrote to memory of 4164 912 SharkHack.exe 77 PID 912 wrote to memory of 3548 912 SharkHack.exe 78 PID 912 wrote to memory of 3548 912 SharkHack.exe 78 PID 912 wrote to memory of 3548 912 SharkHack.exe 78 PID 3548 wrote to memory of 3884 3548 virus.exe 79 PID 3548 wrote to memory of 3884 3548 virus.exe 79 PID 3548 wrote to memory of 3884 3548 virus.exe 79 PID 3548 wrote to memory of 4472 3548 virus.exe 80 PID 3548 wrote to memory of 4472 3548 virus.exe 80 PID 3548 wrote to memory of 4472 3548 virus.exe 80 PID 3548 wrote to memory of 3032 3548 virus.exe 84 PID 3548 wrote to memory of 3032 3548 virus.exe 84 PID 3548 wrote to memory of 3032 3548 virus.exe 84 PID 3032 wrote to memory of 3964 3032 sharkhack.exe 85 PID 3032 wrote to memory of 3964 3032 sharkhack.exe 85 PID 3032 wrote to memory of 3964 3032 sharkhack.exe 85 PID 3032 wrote to memory of 752 3032 sharkhack.exe 86 PID 3032 wrote to memory of 752 3032 sharkhack.exe 86 PID 3032 wrote to memory of 752 3032 sharkhack.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\SharkHack.exe"C:\Users\Admin\AppData\Local\Temp\SharkHack.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\SharkHack1.exe"C:\Users\Admin\AppData\Local\Temp\SharkHack1.exe"2⤵
- Executes dropped EXE
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\virus.exe"C:\Users\Admin\AppData\Local\Temp\virus.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\ProgramData\sharkhack.exe"C:\ProgramData\sharkhack.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD57751bb858985d66226a941ace018c503
SHA1362db42327e8d1816ad81d5a091cefca22369905
SHA256e657bb5a0896c58b62b928e59f68273182ee37105fb1068687dde462193e7fe4
SHA5120bb79e1bf67853ef5138ede1d90080181432b77ba02577d186013524ad5b1fc269e0a796bc367706a309bb4217881312c94afaac6c7ce6b4013af18d438e0d87
-
Filesize
65KB
MD5fc84d53be6875a39382eea9adb353c67
SHA1a96e17f51749b8fd32d913bf925e733149628c43
SHA2567a65e04266f22e0d68e02c6b557d22ba08c3b89d64eb5296a91e2c45e72e4203
SHA5122b63bf65d9aa0922a163c4aaf0d8751d366020661695a255d78b8988e55308f0f0eac75c1781f878ae57c10b1bb1eb42b18559a8c85a464effcfab14c65ac8b1