Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 03:26

General

  • Target

    19ecf834fe05c26c41545caa747ecbf78fa615c1e3d6995eecfe965b1476371c.exe

  • Size

    254KB

  • MD5

    e8d900b1651b5130a5845b0877d3f307

  • SHA1

    f720f9cdc11df475e7d8897fec0bf9f3635547a3

  • SHA256

    19ecf834fe05c26c41545caa747ecbf78fa615c1e3d6995eecfe965b1476371c

  • SHA512

    1b485341fec4d3587d23f78e85da68af1dc0bbef7a8e3bfb4818e86c788046c486544daf46c1cb2fab63354f275ef68dd3283f4e15e42a1584f78c1eeba47e31

  • SSDEEP

    6144:vSdmouW951HZDeXGGOhz8gEhnzeENxunCPL+:vnE95VZDgOhuhz1NxBPS

Score
10/10

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19ecf834fe05c26c41545caa747ecbf78fa615c1e3d6995eecfe965b1476371c.exe
    "C:\Users\Admin\AppData\Local\Temp\19ecf834fe05c26c41545caa747ecbf78fa615c1e3d6995eecfe965b1476371c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 812
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3336-0-0x00007FFC77015000-0x00007FFC77016000-memory.dmp

    Filesize

    4KB

  • memory/3336-1-0x00007FFC76D60000-0x00007FFC77701000-memory.dmp

    Filesize

    9.6MB

  • memory/3336-3-0x00000000018A0000-0x00000000018E0000-memory.dmp

    Filesize

    256KB

  • memory/3336-2-0x00007FFC76D60000-0x00007FFC77701000-memory.dmp

    Filesize

    9.6MB

  • memory/3336-10-0x00007FFC76D60000-0x00007FFC77701000-memory.dmp

    Filesize

    9.6MB