Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 12:05
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20241007-en
General
-
Target
Server.exe
-
Size
37KB
-
MD5
704ed08f02343f35ff669d8ec651d4c1
-
SHA1
44b3f95cd69649435f129d9bcd0363a402d1534a
-
SHA256
92daebf4afdf05aa2b7e92ec7d81c44803d255fc9bd6bbda8f9ed4af271b45da
-
SHA512
022f1ffe197e038c46b2ce46e59106bd910d5eb85fc6a08d999dda14ed5be7eb1c168b7a0e4158ab23368d97c43fd1b44034e543c5c0e68b3ba6fbae860c2cb9
-
SSDEEP
384:ZLm2KMizd9jnBhFbJ8ycPVnvvnwaUBTrAF+rMRTyN/0L+EcoinblneHQM3epzXF0:Q2g9lLJfcPVn3VU9rM+rMRa8Nu7ct
Malware Config
Extracted
njrat
im523
HacKed
5.tcp.eu.ngrok.io:10587
f1a130bd88e2893ab9bf8c985154ecb1
-
reg_key
f1a130bd88e2893ab9bf8c985154ecb1
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2816 netsh.exe 2096 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 njrat_test.exe -
Loads dropped DLL 1 IoCs
pid Process 2868 Server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 5.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njrat_test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2532 cmd.exe 2716 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2716 PING.EXE -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe Token: 33 2928 njrat_test.exe Token: SeIncBasePriorityPrivilege 2928 njrat_test.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2928 2868 Server.exe 30 PID 2868 wrote to memory of 2928 2868 Server.exe 30 PID 2868 wrote to memory of 2928 2868 Server.exe 30 PID 2868 wrote to memory of 2928 2868 Server.exe 30 PID 2928 wrote to memory of 2816 2928 njrat_test.exe 31 PID 2928 wrote to memory of 2816 2928 njrat_test.exe 31 PID 2928 wrote to memory of 2816 2928 njrat_test.exe 31 PID 2928 wrote to memory of 2816 2928 njrat_test.exe 31 PID 2928 wrote to memory of 2096 2928 njrat_test.exe 35 PID 2928 wrote to memory of 2096 2928 njrat_test.exe 35 PID 2928 wrote to memory of 2096 2928 njrat_test.exe 35 PID 2928 wrote to memory of 2096 2928 njrat_test.exe 35 PID 2928 wrote to memory of 2532 2928 njrat_test.exe 36 PID 2928 wrote to memory of 2532 2928 njrat_test.exe 36 PID 2928 wrote to memory of 2532 2928 njrat_test.exe 36 PID 2928 wrote to memory of 2532 2928 njrat_test.exe 36 PID 2532 wrote to memory of 2716 2532 cmd.exe 39 PID 2532 wrote to memory of 2716 2532 cmd.exe 39 PID 2532 wrote to memory of 2716 2532 cmd.exe 39 PID 2532 wrote to memory of 2716 2532 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\njrat_test.exe"C:\Users\Admin\AppData\Local\Temp\njrat_test.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\njrat_test.exe" "njrat_test.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\njrat_test.exe"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /k ping 0 & del "C:\Users\Admin\AppData\Local\Temp\njrat_test.exe" & exit3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\PING.EXEping 04⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5704ed08f02343f35ff669d8ec651d4c1
SHA144b3f95cd69649435f129d9bcd0363a402d1534a
SHA25692daebf4afdf05aa2b7e92ec7d81c44803d255fc9bd6bbda8f9ed4af271b45da
SHA512022f1ffe197e038c46b2ce46e59106bd910d5eb85fc6a08d999dda14ed5be7eb1c168b7a0e4158ab23368d97c43fd1b44034e543c5c0e68b3ba6fbae860c2cb9