Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 16:51
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20241007-en
General
-
Target
a.exe
-
Size
165KB
-
MD5
ab291dfdae1f44bd81ec75de9dd657d6
-
SHA1
3cfca0456d8037e9759bce00991bd06d6dab8c86
-
SHA256
578bd705fdf85e864f09780e885c2a04305a719038b66b2ff5639bf2572600de
-
SHA512
71239480308c81ff5f4cde60cb54d05e37cb966ed276dd01cd70536728474d5f412aada83504890c065b6e34ff354fc5920f12b9ccd9a11875711fcffffc5cea
-
SSDEEP
3072:fP8VpD/T68Q8wsWMS1kDGo/JzlJCFEw2iNb0Zr15bO:fP8V2f1k7/JBYW/ebmO
Malware Config
Signatures
-
Njrat family
-
Executes dropped EXE 3 IoCs
pid Process 2840 x64dbg.exe 1648 x64dbg.exe 2988 x64dbg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\x64dbg.exe = "\"C:\\Windows\\x64dbg.exe\" .." x64dbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\x64dbg.exe = "\"C:\\Windows\\x64dbg.exe\" .." x64dbg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\x64dbg.exe x64dbg.exe File created C:\Windows\x64dbg.exe a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x64dbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x64dbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x64dbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3008 schtasks.exe 2956 schtasks.exe 2360 schtasks.exe 2052 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe Token: 33 2840 x64dbg.exe Token: SeIncBasePriorityPrivilege 2840 x64dbg.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2612 1048 a.exe 30 PID 1048 wrote to memory of 2612 1048 a.exe 30 PID 1048 wrote to memory of 2612 1048 a.exe 30 PID 1048 wrote to memory of 2612 1048 a.exe 30 PID 1048 wrote to memory of 3008 1048 a.exe 32 PID 1048 wrote to memory of 3008 1048 a.exe 32 PID 1048 wrote to memory of 3008 1048 a.exe 32 PID 1048 wrote to memory of 3008 1048 a.exe 32 PID 1048 wrote to memory of 2840 1048 a.exe 34 PID 1048 wrote to memory of 2840 1048 a.exe 34 PID 1048 wrote to memory of 2840 1048 a.exe 34 PID 1048 wrote to memory of 2840 1048 a.exe 34 PID 2840 wrote to memory of 2816 2840 x64dbg.exe 35 PID 2840 wrote to memory of 2816 2840 x64dbg.exe 35 PID 2840 wrote to memory of 2816 2840 x64dbg.exe 35 PID 2840 wrote to memory of 2816 2840 x64dbg.exe 35 PID 2840 wrote to memory of 2956 2840 x64dbg.exe 37 PID 2840 wrote to memory of 2956 2840 x64dbg.exe 37 PID 2840 wrote to memory of 2956 2840 x64dbg.exe 37 PID 2840 wrote to memory of 2956 2840 x64dbg.exe 37 PID 2228 wrote to memory of 1648 2228 taskeng.exe 41 PID 2228 wrote to memory of 1648 2228 taskeng.exe 41 PID 2228 wrote to memory of 1648 2228 taskeng.exe 41 PID 2228 wrote to memory of 1648 2228 taskeng.exe 41 PID 1648 wrote to memory of 1420 1648 x64dbg.exe 42 PID 1648 wrote to memory of 1420 1648 x64dbg.exe 42 PID 1648 wrote to memory of 1420 1648 x64dbg.exe 42 PID 1648 wrote to memory of 1420 1648 x64dbg.exe 42 PID 1648 wrote to memory of 2360 1648 x64dbg.exe 44 PID 1648 wrote to memory of 2360 1648 x64dbg.exe 44 PID 1648 wrote to memory of 2360 1648 x64dbg.exe 44 PID 1648 wrote to memory of 2360 1648 x64dbg.exe 44 PID 2228 wrote to memory of 2988 2228 taskeng.exe 46 PID 2228 wrote to memory of 2988 2228 taskeng.exe 46 PID 2228 wrote to memory of 2988 2228 taskeng.exe 46 PID 2228 wrote to memory of 2988 2228 taskeng.exe 46 PID 2988 wrote to memory of 2448 2988 x64dbg.exe 47 PID 2988 wrote to memory of 2448 2988 x64dbg.exe 47 PID 2988 wrote to memory of 2448 2988 x64dbg.exe 47 PID 2988 wrote to memory of 2448 2988 x64dbg.exe 47 PID 2988 wrote to memory of 2052 2988 x64dbg.exe 49 PID 2988 wrote to memory of 2052 2988 x64dbg.exe 49 PID 2988 wrote to memory of 2052 2988 x64dbg.exe 49 PID 2988 wrote to memory of 2052 2988 x64dbg.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\a.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3008
-
-
C:\Windows\x64dbg.exe"C:\Windows\x64dbg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Windows\x64dbg.exe" /sc minute /mo 13⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2956
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B95CD0CC-FF52-4A39-ADF8-4D9E148365EF} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\x64dbg.exeC:\Windows\x64dbg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Windows\x64dbg.exe" /sc minute /mo 13⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
-
C:\Windows\x64dbg.exeC:\Windows\x64dbg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Windows\x64dbg.exe" /sc minute /mo 13⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2052
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5ab291dfdae1f44bd81ec75de9dd657d6
SHA13cfca0456d8037e9759bce00991bd06d6dab8c86
SHA256578bd705fdf85e864f09780e885c2a04305a719038b66b2ff5639bf2572600de
SHA51271239480308c81ff5f4cde60cb54d05e37cb966ed276dd01cd70536728474d5f412aada83504890c065b6e34ff354fc5920f12b9ccd9a11875711fcffffc5cea