Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 02:21
Behavioral task
behavioral1
Sample
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe
Resource
win10v2004-20241007-en
General
-
Target
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe
-
Size
37KB
-
MD5
ebd4a0747e8663cb885cf2b86153352d
-
SHA1
ac610e0e9d8d36153c87f24e11a8080e3edadcd9
-
SHA256
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6
-
SHA512
54946f3d035ed6b8081e9329cc612ef3c048e593a28ef083095a2232c757a94b9b204bb34982e2287912742accee42d22f201f6db8855e15245ebceb5f366ab0
-
SSDEEP
384:5eL8CT0i9NdTe/kCOyU7NuvLmDPM+CrAF+rMRTyN/0L+EcoinblneHQM3epzXeNX:QLhT1CFU7NuKbMdrM+rMRa8Nu4Ht
Malware Config
Extracted
njrat
im523
HacKed
127.0.0.1:7326
41563bca2271dd5d1babb5367aececa5
-
reg_key
41563bca2271dd5d1babb5367aececa5
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 776 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 server.exe -
Loads dropped DLL 1 IoCs
pid Process 2420 b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe Token: 33 2084 server.exe Token: SeIncBasePriorityPrivilege 2084 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2084 2420 b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe 31 PID 2420 wrote to memory of 2084 2420 b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe 31 PID 2420 wrote to memory of 2084 2420 b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe 31 PID 2420 wrote to memory of 2084 2420 b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe 31 PID 2084 wrote to memory of 776 2084 server.exe 32 PID 2084 wrote to memory of 776 2084 server.exe 32 PID 2084 wrote to memory of 776 2084 server.exe 32 PID 2084 wrote to memory of 776 2084 server.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe"C:\Users\Admin\AppData\Local\Temp\b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:776
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5ebd4a0747e8663cb885cf2b86153352d
SHA1ac610e0e9d8d36153c87f24e11a8080e3edadcd9
SHA256b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6
SHA51254946f3d035ed6b8081e9329cc612ef3c048e593a28ef083095a2232c757a94b9b204bb34982e2287912742accee42d22f201f6db8855e15245ebceb5f366ab0