Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 00:34
Behavioral task
behavioral1
Sample
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe
Resource
win10v2004-20241007-en
General
-
Target
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe
-
Size
93KB
-
MD5
ccb06fa4b339cc8ff5ae2331dda084b4
-
SHA1
0d1af1ebe0cb29ebf9ea4c76a7630661553b64db
-
SHA256
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953
-
SHA512
a716f4906ac8ba1135471deef804e886891cfdc7b3f8b8d471a8fec0aadb0a39051b5adb3930c6a715b2c7a6a46168bacb6ef9705925bfd02fd88b4ebc335952
-
SSDEEP
1536:InwEnYi9bzKuZ+8uZ3nV5XS65mkrPZ58kzQ+e+e+:IwaYi9bsh7J7M+e+e+
Malware Config
Extracted
njrat
v4.0
Steam
40.80.147.203:8080
Steam
-
reg_key
Steam
-
splitter
|-F-|
Signatures
-
Njrat family
-
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe Steam.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.lnk 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.lnk Steam.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe Steam.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 Steam.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam2 = "C:\\Windows\\Steam.exe" 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Steam2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Steam.exe 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe File opened for modification C:\Windows\Steam.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe Token: 33 2476 Steam.exe Token: SeIncBasePriorityPrivilege 2476 Steam.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2476 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 31 PID 1784 wrote to memory of 2476 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 31 PID 1784 wrote to memory of 2476 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 31 PID 1784 wrote to memory of 2476 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 31 PID 1784 wrote to memory of 2484 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 32 PID 1784 wrote to memory of 2484 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 32 PID 1784 wrote to memory of 2484 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 32 PID 1784 wrote to memory of 2484 1784 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 32 PID 2476 wrote to memory of 2144 2476 Steam.exe 34 PID 2476 wrote to memory of 2144 2476 Steam.exe 34 PID 2476 wrote to memory of 2144 2476 Steam.exe 34 PID 2476 wrote to memory of 2144 2476 Steam.exe 34 PID 2476 wrote to memory of 2812 2476 Steam.exe 35 PID 2476 wrote to memory of 2812 2476 Steam.exe 35 PID 2476 wrote to memory of 2812 2476 Steam.exe 35 PID 2476 wrote to memory of 2812 2476 Steam.exe 35 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2484 attrib.exe 2144 attrib.exe 2812 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe"C:\Users\Admin\AppData\Local\Temp\861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\Steam.exe"C:\Windows\Steam.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2144
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Steam.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2812
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Windows\Steam.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c698feb4275e8418a3bb62573a8567f7
SHA1330cbc27250a6f145e16b3fbc3e25f69d6753b49
SHA2566990585028dc93b82cc2c505bef9bd92862807d96909f16bbe712d0b533d7584
SHA5128a3ad99d6803d4e9ce21d0b95536445da25f1616f9357007435aee384cd79ecd3fc48e52dcb9a0d24d821d96c6751ffba8d4cc69e889d7fa43017aef63007c55
-
Filesize
1008B
MD5eba67b04117319b7dc98f3cd1ef1e8d1
SHA18e4a7e464ba63c04ddeaf58a2cf3b3da65c9d436
SHA256e608fbd93cfdb35acc0af44c78c0e1645ea4640c2746d5d006ad5bfbc2f377ae
SHA5128a9b67321450b73f1f65984a9295891a0e29ade7fd5afd4c0ab63bae06ade6050cb045c060532138774d179010b43ef329c7678b181b4c8f3ee08e7bba0842ca
-
Filesize
93KB
MD5ccb06fa4b339cc8ff5ae2331dda084b4
SHA10d1af1ebe0cb29ebf9ea4c76a7630661553b64db
SHA256861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953
SHA512a716f4906ac8ba1135471deef804e886891cfdc7b3f8b8d471a8fec0aadb0a39051b5adb3930c6a715b2c7a6a46168bacb6ef9705925bfd02fd88b4ebc335952