Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 02:07
Behavioral task
behavioral1
Sample
1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe
Resource
win7-20240903-en
General
-
Target
1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe
-
Size
43KB
-
MD5
831391429d50f54bdad48209d87e7370
-
SHA1
8feb1f6f7df7863eb6aa711d952f4ac85f2d97f3
-
SHA256
1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498
-
SHA512
d19fc494de57e02f18162d7056cb93b7431dff4315d1300e9d1b6e9b95a8fa0d96a378a6896d1f0d604e17c4b55b3f72c90781d9bc1482e649d4c7d4fcc63dbc
-
SSDEEP
384:1ZyZcg98NaIyrtdd32E68ETiE7QzsIij+ZsNO3PlpJKkkjh/TzF7pWnYmgreT0pO:f4ywFrLd32HfquXQ/oRC+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
4.tcp.eu.ngrok.io:16948
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 2 4.tcp.eu.ngrok.io 12 4.tcp.eu.ngrok.io 41 4.tcp.eu.ngrok.io 70 4.tcp.eu.ngrok.io -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: 33 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe Token: SeIncBasePriorityPrivilege 1624 1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe"C:\Users\Admin\AppData\Local\Temp\1cd657fbab02d949326cc0d174b2d3909fa32cd4c53592ae530ff33379528498.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1624