Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:47
Behavioral task
behavioral1
Sample
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
Resource
win7-20240903-en
General
-
Target
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
-
Size
172KB
-
MD5
615e7480ad72e1972fc90fbb1fa23bb0
-
SHA1
aec002a1465c11efcf492273bee97a22c8b6fa77
-
SHA256
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d
-
SHA512
8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalRFvh4Bge+yJYL:UsLqdufVUNDaBh4GH
Malware Config
Extracted
njrat
im523
HacKed
learn-rage.gl.at.ply.gg:27556
e456603c650484e45e47269f670d15a9
-
reg_key
e456603c650484e45e47269f670d15a9
-
splitter
|'|'|
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Njrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe -
Executes dropped EXE 10 IoCs
pid Process 2660 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 2416 icsys.icn.exe 4536 explorer.exe 376 spoolsv.exe 2692 svchost.exe 2632 server.exe 3132 spoolsv.exe 2784 server.exe 4572 icsys.icn.exe 840 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe server.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 2416 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4536 explorer.exe 2692 svchost.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2416 icsys.icn.exe 2416 icsys.icn.exe 4536 explorer.exe 4536 explorer.exe 376 spoolsv.exe 376 spoolsv.exe 2692 svchost.exe 2692 svchost.exe 2632 server.exe 2632 server.exe 3132 spoolsv.exe 3132 spoolsv.exe 4572 icsys.icn.exe 4572 icsys.icn.exe 840 explorer.exe 840 explorer.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2660 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 83 PID 2980 wrote to memory of 2660 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 83 PID 2980 wrote to memory of 2660 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 83 PID 2980 wrote to memory of 2416 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 85 PID 2980 wrote to memory of 2416 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 85 PID 2980 wrote to memory of 2416 2980 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 85 PID 2416 wrote to memory of 4536 2416 icsys.icn.exe 86 PID 2416 wrote to memory of 4536 2416 icsys.icn.exe 86 PID 2416 wrote to memory of 4536 2416 icsys.icn.exe 86 PID 4536 wrote to memory of 376 4536 explorer.exe 87 PID 4536 wrote to memory of 376 4536 explorer.exe 87 PID 4536 wrote to memory of 376 4536 explorer.exe 87 PID 376 wrote to memory of 2692 376 spoolsv.exe 88 PID 376 wrote to memory of 2692 376 spoolsv.exe 88 PID 376 wrote to memory of 2692 376 spoolsv.exe 88 PID 2660 wrote to memory of 2632 2660 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 89 PID 2660 wrote to memory of 2632 2660 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 89 PID 2660 wrote to memory of 2632 2660 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 89 PID 2692 wrote to memory of 3132 2692 svchost.exe 90 PID 2692 wrote to memory of 3132 2692 svchost.exe 90 PID 2692 wrote to memory of 3132 2692 svchost.exe 90 PID 2632 wrote to memory of 2784 2632 server.exe 91 PID 2632 wrote to memory of 2784 2632 server.exe 91 PID 2632 wrote to memory of 2784 2632 server.exe 91 PID 2632 wrote to memory of 4572 2632 server.exe 100 PID 2632 wrote to memory of 4572 2632 server.exe 100 PID 2632 wrote to memory of 4572 2632 server.exe 100 PID 4572 wrote to memory of 840 4572 icsys.icn.exe 101 PID 4572 wrote to memory of 840 4572 icsys.icn.exe 101 PID 4572 wrote to memory of 840 4572 icsys.icn.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe"C:\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\users\admin\appdata\local\temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exec:\users\admin\appdata\local\temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\users\admin\appdata\local\temp\server.exec:\users\admin\appdata\local\temp\server.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:840
-
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3132
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe
Filesize37KB
MD5266dab6809fcc7a59f79a36edfff6682
SHA1ab0b69adea1fffa3f35705db40c9b4531624ea84
SHA25672f1513b6c29378f8e7cb14a727ccdea12f1581ebcb84a2a5dd7da8a2b70cc6d
SHA5124a8b8904023deb4b31f42bf50cb9d3e5018158a52fde270dac933f6978153b9c9bf801093d7aec22e654c7ff50e57f970db9b14ffbf4e3e61df5858ad2830f15
-
Filesize
172KB
MD5615e7480ad72e1972fc90fbb1fa23bb0
SHA1aec002a1465c11efcf492273bee97a22c8b6fa77
SHA256d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d
SHA5128d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19
-
Filesize
135KB
MD52c1d7bdf6fd0ab2cea4d94f46d082583
SHA1d95685793d698e582b401b3041d818bfbb151e40
SHA256a1ef829b4418329a57c2bf88d304850ae40f823a261b842f6367dac24c96ef0e
SHA512c2ac552a14c18d369d3e20cf59355e4847dcdc43ff32f505efc9999e289f80fa35386dcbd6eb19cb736cc5c96560833be16a25cd1bb6dc8f8090963fee1d5816
-
Filesize
135KB
MD59fcb365b27da55232f5db607c1a5684d
SHA1906d0e0648cccc8aebbe79442e53fcab995442d6
SHA2567dce4cb6b2200d874a50723ab3fe2f318f8628103eed95b3cfaa7727a89c3994
SHA512ea219830897ca8b2d3dc39d90eefe4ced03f976ff128516878723ea505009b577c2e9a8169c050f440c97b54c750616acc14615740ca0f347d69a400fcf49dab
-
Filesize
135KB
MD51e6253ffecf5b6e42b027f909e4f1f9d
SHA178961e7f392e2895d71da5d91743c85eb54090c7
SHA256a71bacd3af9ac4b1d804425c9af836edabaf3591df3d2ee279a3c5db0e383fcc
SHA5124d84f0ebe744a1a23222f32ef85a9068e0b64a5ff3f9cb224eaff31dafe6daaeb9c8748bd099fb8a181b16f720876d134204b86daa7502253cd0a7ffbe2df238
-
Filesize
135KB
MD5bd3f08dc88fae6a0776c3a1f346eefe5
SHA1e204b3c95e800ae65e2f51c344a9f46547c78b54
SHA2568cc0f068d682aa522ad7957a42bfb462629599f203e048f7187ada870475aaea
SHA512c8804cec64d4dfe303034f8c2de6bf870f411f7ea102ae38893e06647a82b16d13d1f827071706e9c0b607689ee3e8dd83a1d881df7253d953a27cdd1ba1d4d4