Overview
overview
10Static
static
10njRAT-v0.6...il.dll
windows7-x64
1njRAT-v0.6...il.dll
windows10-2004-x64
1njRAT-v0.6...io.dll
windows7-x64
1njRAT-v0.6...io.dll
windows10-2004-x64
1njRAT-v0.6...ic.dll
windows7-x64
1njRAT-v0.6...ic.dll
windows10-2004-x64
1njRAT-v0.6...am.dll
windows7-x64
3njRAT-v0.6...am.dll
windows10-2004-x64
3njRAT-v0.6...ch.dll
windows7-x64
1njRAT-v0.6...ch.dll
windows10-2004-x64
1njRAT-v0.6...fm.dll
windows7-x64
1njRAT-v0.6...fm.dll
windows10-2004-x64
1njRAT-v0.6...pw.dll
windows7-x64
1njRAT-v0.6...pw.dll
windows10-2004-x64
1njRAT-v0.6...c2.dll
windows7-x64
1njRAT-v0.6...c2.dll
windows10-2004-x64
1njRAT-v0.6...AT.exe
windows7-x64
10njRAT-v0.6...AT.exe
windows10-2004-x64
10njRAT-v0.6.4/stub.ps1
windows7-x64
3njRAT-v0.6.4/stub.ps1
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 13:33
Behavioral task
behavioral1
Sample
njRAT-v0.6.4/Mono.Cecil.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
njRAT-v0.6.4/Mono.Cecil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
njRAT-v0.6.4/NAudio.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
njRAT-v0.6.4/NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
njRAT-v0.6.4/Plugin/Mic.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
njRAT-v0.6.4/Plugin/Mic.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
njRAT-v0.6.4/Plugin/cam.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
njRAT-v0.6.4/Plugin/cam.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
njRAT-v0.6.4/Plugin/ch.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
njRAT-v0.6.4/Plugin/ch.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
njRAT-v0.6.4/Plugin/fm.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
njRAT-v0.6.4/Plugin/fm.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
njRAT-v0.6.4/Plugin/pw.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
njRAT-v0.6.4/Plugin/pw.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
njRAT-v0.6.4/Plugin/sc2.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
njRAT-v0.6.4/Plugin/sc2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
njRAT-v0.6.4/njRAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
njRAT-v0.6.4/njRAT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
njRAT-v0.6.4/stub.ps1
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
njRAT-v0.6.4/stub.ps1
Resource
win10v2004-20241007-en
General
-
Target
njRAT-v0.6.4/njRAT.exe
-
Size
959KB
-
MD5
0431311b5f024d6e66b90d59491f2563
-
SHA1
e9ff4da7e3f2199cbc16d37d8935cb1b0567ac2a
-
SHA256
fd624aa205517580e83fad7a4ce4d64863e95f62b34ac72647b1974a52822199
-
SHA512
d44b14e4b24e6e2d506ec32098488a16ebd5df57499ecd85e8878b8af2a3e1f9ed20d4125836417b702d0571f992aeac07af051dbf9268f48954556d17f51ee2
-
SSDEEP
12288:+O9vE3J7JO+xEPuc//9wivAmv6SAbnzmip2hGnadlFM4ZHOT2:+eXuczPCSGnzVjad1
Malware Config
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2224 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation njq8.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation njRAT.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecc7c8c51c0850c1ec247c7fd3602f20.exe windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecc7c8c51c0850c1ec247c7fd3602f20.exe windows.exe -
Executes dropped EXE 3 IoCs
pid Process 1472 njRAT.exe 788 njq8.exe 3024 windows.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ecc7c8c51c0850c1ec247c7fd3602f20 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe\" .." windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ecc7c8c51c0850c1ec247c7fd3602f20 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe\" .." windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njq8.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe 3024 windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3024 windows.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1472 2540 njRAT.exe 82 PID 2540 wrote to memory of 1472 2540 njRAT.exe 82 PID 2540 wrote to memory of 1472 2540 njRAT.exe 82 PID 2540 wrote to memory of 788 2540 njRAT.exe 83 PID 2540 wrote to memory of 788 2540 njRAT.exe 83 PID 2540 wrote to memory of 788 2540 njRAT.exe 83 PID 788 wrote to memory of 3024 788 njq8.exe 84 PID 788 wrote to memory of 3024 788 njq8.exe 84 PID 788 wrote to memory of 3024 788 njq8.exe 84 PID 3024 wrote to memory of 2224 3024 windows.exe 85 PID 3024 wrote to memory of 2224 3024 windows.exe 85 PID 3024 wrote to memory of 2224 3024 windows.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\njRAT-v0.6.4\njRAT.exe"C:\Users\Admin\AppData\Local\Temp\njRAT-v0.6.4\njRAT.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\njRAT.exe"C:\njRAT.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\njq8.exe"C:\njq8.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\windows.exe" "windows.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
898KB
MD508f223ac15e2e92561ed310ae71415c1
SHA10a871a4b376bd8771188b96a9a1bb6fe1205160d
SHA25651f2aec8b6de1e49b1ca74203afd380484932b07067a91f027548bc20b8967ec
SHA5129acc7b4976c23fa019361b52eb22dcdfbf0bb1039aa8c8e74507f0501709616757a2d762d0478956a03bfadecdee812c9aa2360655891ab4ed1de96f35e23cd4
-
Filesize
28KB
MD5edc4f10a5e164db64bf79eca207f2749
SHA1d08eb761a5446a4409a72f3af3fb8dd60eec7c92
SHA256ce6421107031175f39e61d3bcc5a98d1d94190e250034e27cdbebbadcba084a4
SHA512e974a32096cc58c1a78c7aa8714b8b8b7a202859905a28d5ce61fd9a563382a7577825e8c9ee612d7ba708f3efef01a43d07df03e7c1e3e52d0cb32240d5d15d