Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe
Resource
win10v2004-20241007-en
General
-
Target
45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe
-
Size
39KB
-
MD5
537373fde8a3c534ec04135f5cafc720
-
SHA1
9dae8d505e7e0df78cc142bab6e08b0816431ad0
-
SHA256
45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258
-
SHA512
4984f560442066ef5da1f592e5c2e6ea163d22627cb4e87972e3cd1c315d6b812c23748a4cf76e5f1aa8c94afa9e0e007226981e94a2d358871a9d4a6aa1cf8e
-
SSDEEP
768:YEv5CfJ9Wdi3EKbVMsA+5otbIMimDhZLPrYBiIVQgzOqn4GNA:YEvsfP3NAec0Mi8nYcIVgqj2
Malware Config
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2092 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31f597555c7d30f4acc0fdc52daa0304.exe 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31f597555c7d30f4acc0fdc52daa0304.exe 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: 33 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe Token: SeIncBasePriorityPrivilege 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2092 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 31 PID 2560 wrote to memory of 2092 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 31 PID 2560 wrote to memory of 2092 2560 45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe"C:\Users\Admin\AppData\Local\Temp\45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe" "45bda8c92e7b4911c253a9bb48789a11b46a34659971fbf0f600c8d51f9cd258N.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2092
-