Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 00:34
Behavioral task
behavioral1
Sample
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe
Resource
win10v2004-20241007-en
General
-
Target
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe
-
Size
93KB
-
MD5
ccb06fa4b339cc8ff5ae2331dda084b4
-
SHA1
0d1af1ebe0cb29ebf9ea4c76a7630661553b64db
-
SHA256
861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953
-
SHA512
a716f4906ac8ba1135471deef804e886891cfdc7b3f8b8d471a8fec0aadb0a39051b5adb3930c6a715b2c7a6a46168bacb6ef9705925bfd02fd88b4ebc335952
-
SSDEEP
1536:InwEnYi9bzKuZ+8uZ3nV5XS65mkrPZ58kzQ+e+e+:IwaYi9bsh7J7M+e+e+
Malware Config
Extracted
njrat
v4.0
Steam
40.80.147.203:8080
Steam
-
reg_key
Steam
-
splitter
|-F-|
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe Steam.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe Steam.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.lnk 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.lnk Steam.exe -
Executes dropped EXE 1 IoCs
pid Process 4628 Steam.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam2 = "C:\\Windows\\Steam.exe" 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Steam2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Steam.URL" Steam.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Steam.exe attrib.exe File created C:\Windows\Steam.exe 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe Token: 33 4628 Steam.exe Token: SeIncBasePriorityPrivilege 4628 Steam.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4628 4792 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 91 PID 4792 wrote to memory of 4628 4792 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 91 PID 4792 wrote to memory of 4628 4792 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 91 PID 4792 wrote to memory of 4192 4792 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 92 PID 4792 wrote to memory of 4192 4792 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 92 PID 4792 wrote to memory of 4192 4792 861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe 92 PID 4628 wrote to memory of 2408 4628 Steam.exe 99 PID 4628 wrote to memory of 2408 4628 Steam.exe 99 PID 4628 wrote to memory of 2408 4628 Steam.exe 99 PID 4628 wrote to memory of 3536 4628 Steam.exe 100 PID 4628 wrote to memory of 3536 4628 Steam.exe 100 PID 4628 wrote to memory of 3536 4628 Steam.exe 100 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4192 attrib.exe 2408 attrib.exe 3536 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe"C:\Users\Admin\AppData\Local\Temp\861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\Steam.exe"C:\Windows\Steam.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.exe"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2408
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Steam.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3536
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Windows\Steam.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4192
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5747ab73eda9f1699d9642b4b6138e8bc
SHA1eefe90f618f2195e112d4ce967711792ab55688b
SHA256d1a1dac4d709aca9f9d3cdccc8cee82715fec09db136399967e81931e18f7856
SHA51229cb36eb768efc5b5bb279166cfd7524179f01f5c694d12ae7109679542d7e1e0b1290e9370405ab17aac6be826508c5a88554a7427068c913a7f89a57d50d49
-
Filesize
1KB
MD58311fe8724863d68eaa4411ebd3ea82e
SHA171dfcb7d233201b79ffa17bb7b5a1a9a04b35d19
SHA256232ac349846ed38e5fe2219585059cced5d61967351bb0e2d7dde70b608932d3
SHA51249ff96c39d71af0870d0c7cb5c71355bc9b857f1bb406864a8beb65b9878c609561bd85fd1993e769c06250c2c58cf8d177b5c376fc5a42247901cfff64544e0
-
Filesize
93KB
MD5ccb06fa4b339cc8ff5ae2331dda084b4
SHA10d1af1ebe0cb29ebf9ea4c76a7630661553b64db
SHA256861c62fc1b264801e17d6a61ac6579a3b7d6d39e2f35aec69fc1b8300f42c953
SHA512a716f4906ac8ba1135471deef804e886891cfdc7b3f8b8d471a8fec0aadb0a39051b5adb3930c6a715b2c7a6a46168bacb6ef9705925bfd02fd88b4ebc335952