Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 11:03
Behavioral task
behavioral1
Sample
mos ssssttttt.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
mos ssssttttt.exe
Resource
win10v2004-20241007-en
General
-
Target
mos ssssttttt.exe
-
Size
93KB
-
MD5
8be7cd574b5424c43a6d0ccc4a989412
-
SHA1
946d22547849765d756071f63be3417b30f39c6f
-
SHA256
87a40d2e8ebe033ff3d359309dda136f1bced5c5578c8ea7d05b9d97e5adb12f
-
SHA512
8aff9965a7c8ccb357b3e026c2b65eb0457d4967ddbbb269f781ce62c9c77667b3a7ed4e8794bdaff6a7adfd46757cf1579bf740ec5a0d2747efa824bcf18eeb
-
SSDEEP
1536:lIEQIBlfGQFk2ZonmzlMxjEwzGi1dD1DYgS:lICtFk2ZonmZMOi1dxB
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:444
990be91699f271511aed6c9147533362
-
reg_key
990be91699f271511aed6c9147533362
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 3052 netsh.exe 2348 netsh.exe 1948 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1772 StUpdate.exe 2484 StUpdate.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mos ssssttttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe 4828 mos ssssttttt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4828 mos ssssttttt.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe Token: 33 4828 mos ssssttttt.exe Token: SeIncBasePriorityPrivilege 4828 mos ssssttttt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3052 4828 mos ssssttttt.exe 83 PID 4828 wrote to memory of 3052 4828 mos ssssttttt.exe 83 PID 4828 wrote to memory of 3052 4828 mos ssssttttt.exe 83 PID 4828 wrote to memory of 2348 4828 mos ssssttttt.exe 85 PID 4828 wrote to memory of 2348 4828 mos ssssttttt.exe 85 PID 4828 wrote to memory of 2348 4828 mos ssssttttt.exe 85 PID 4828 wrote to memory of 1948 4828 mos ssssttttt.exe 86 PID 4828 wrote to memory of 1948 4828 mos ssssttttt.exe 86 PID 4828 wrote to memory of 1948 4828 mos ssssttttt.exe 86 PID 4828 wrote to memory of 2464 4828 mos ssssttttt.exe 88 PID 4828 wrote to memory of 2464 4828 mos ssssttttt.exe 88 PID 4828 wrote to memory of 2464 4828 mos ssssttttt.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\mos ssssttttt.exe"C:\Users\Admin\AppData\Local\Temp\mos ssssttttt.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\mos ssssttttt.exe" "mos ssssttttt.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\mos ssssttttt.exe"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\mos ssssttttt.exe" "mos ssssttttt.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn StUpdate /tr C:\Users\Admin\AppData\Local\Temp/StUpdate.exe2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\StUpdate.exeC:\Users\Admin\AppData\Local\Temp/StUpdate.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772
-
C:\Users\Admin\AppData\Local\Temp\StUpdate.exeC:\Users\Admin\AppData\Local\Temp/StUpdate.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5661cab77d3b907e8057f2e689e995af3
SHA15d1a0ee9c5ee7a7a90d56d00c10dc0e679bee01c
SHA2568f27f95ad7c09f2e05d7960e78ef8cd935c1262e9657883a75d70dcb877592d2
SHA5122523b316bd79fed0e9b3d73f46959f3dfe270cf950f34bd9d49fe4113a2ae46d0cd00224d848bc40c0d8c55449e2dccc4b4278ba4809c0ca9ede1ac75673fc67
-
Filesize
93KB
MD58be7cd574b5424c43a6d0ccc4a989412
SHA1946d22547849765d756071f63be3417b30f39c6f
SHA25687a40d2e8ebe033ff3d359309dda136f1bced5c5578c8ea7d05b9d97e5adb12f
SHA5128aff9965a7c8ccb357b3e026c2b65eb0457d4967ddbbb269f781ce62c9c77667b3a7ed4e8794bdaff6a7adfd46757cf1579bf740ec5a0d2747efa824bcf18eeb
-
Filesize
5B
MD5bbcd2be775370c1e106e66d077a93f3b
SHA1a44b6a98f30e3275fc304bc3b29e0eab8ae47f20
SHA256a7aa76f137ba550c381cfb8e5195a01963ae49db167e1cd1e0a8b902ed81eda1
SHA512bb6e0d1f24253a9525fd538debf8ca68eb7078cb8539140c184331a854ecdea192fbcc314c4154a0a474c9aec41a79efeb8150922454c3c9e71eeb5297ae2f72