Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:10
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
300 seconds
General
-
Target
Server.exe
-
Size
43KB
-
MD5
d9dcbd5ca89e7a8e76691c7dca8046c3
-
SHA1
51036c72c965a41c994bcc6d24d943eebf471c35
-
SHA256
177954bd295446d67974df22cae9c9d106cce8af9286ef287f1faaf51c1a8255
-
SHA512
d6ed3f468d1969521b78dd0781730ee77dbf473e5423905e76a0314bd2744e1fcb08ad931b7dc5a89b6def3bd90356400b00c4f73bdeb8a349817094a40d8d69
-
SSDEEP
384:IZyZcg98NaIyrtdd32E68ETiE7QzsIij+ZsNO3PlpJKkkjh/TzF7pWnXmgreT0pO:+4ywFrLd32HfquXQ/ouC+L
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
HacKed
C2
6.tcp.eu.ngrok.io:11237
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 56 6.tcp.eu.ngrok.io 70 6.tcp.eu.ngrok.io 88 6.tcp.eu.ngrok.io 2 6.tcp.eu.ngrok.io 27 6.tcp.eu.ngrok.io 36 6.tcp.eu.ngrok.io -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 Server.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe Token: SeIncBasePriorityPrivilege 2536 Server.exe Token: 33 2536 Server.exe