Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 11:38
Behavioral task
behavioral1
Sample
spofrln.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
spofrln.exe
Resource
win10v2004-20241007-en
General
-
Target
spofrln.exe
-
Size
37KB
-
MD5
fdf0546d58297a6e51596876a12239b8
-
SHA1
e3a107f3f5a3d42548a1be0e8a23fc24206f70e5
-
SHA256
f224346929620555fc8ffea8a7814cccd5073434c3607583e4e87414cb599352
-
SHA512
56ab06704bb457c332afb7ea0703c826c1bf94dcc83912d8478d9b81d67e7e3eaffe25ba8883df39fb9ee3c0b0644b87cd0970274a6fc1717fa620af9e9deac7
-
SSDEEP
768:pulv2NWtkr+kJruz5irrM+rMRa8Nujp8t:kluNWiqk1u80+gRJNq
Malware Config
Extracted
njrat
im523
ktx
kartoxamc.ga:4726
9bce47647dc8a6718dc5325121b298da
-
reg_key
9bce47647dc8a6718dc5325121b298da
-
splitter
|'|'|
Signatures
-
Njrat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spofrln.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2756 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 AcroRd32.exe 2756 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2960 2772 spofrln.exe 31 PID 2772 wrote to memory of 2960 2772 spofrln.exe 31 PID 2772 wrote to memory of 2960 2772 spofrln.exe 31 PID 2772 wrote to memory of 2960 2772 spofrln.exe 31 PID 2772 wrote to memory of 2960 2772 spofrln.exe 31 PID 2772 wrote to memory of 2960 2772 spofrln.exe 31 PID 2772 wrote to memory of 2960 2772 spofrln.exe 31 PID 2960 wrote to memory of 2756 2960 rundll32.exe 32 PID 2960 wrote to memory of 2756 2960 rundll32.exe 32 PID 2960 wrote to memory of 2756 2960 rundll32.exe 32 PID 2960 wrote to memory of 2756 2960 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\spofrln.exe"C:\Users\Admin\AppData\Local\Temp\spofrln.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\microsp2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\microsp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5fdf0546d58297a6e51596876a12239b8
SHA1e3a107f3f5a3d42548a1be0e8a23fc24206f70e5
SHA256f224346929620555fc8ffea8a7814cccd5073434c3607583e4e87414cb599352
SHA51256ab06704bb457c332afb7ea0703c826c1bf94dcc83912d8478d9b81d67e7e3eaffe25ba8883df39fb9ee3c0b0644b87cd0970274a6fc1717fa620af9e9deac7
-
Filesize
3KB
MD54a93134af102b6d19ccf96f1e7843f72
SHA1730a4a52d091cd2e8b694a7df15453d231a37d13
SHA256c2e08fb2f006deaab80da3a1e475031c9533190ca6c58f4a1f35118804e3eac4
SHA51288550e7db14e9c0b55c8ec75d02752a183fce76c912505b00f66237b88daeff71345ac8ee5a3e2b4ce3079be517be5bc8bfb92c14acb5c89a20d92ee26d4472b