Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 14:06
Static task
static1
Behavioral task
behavioral1
Sample
c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe
Resource
win7-20241010-en
General
-
Target
c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe
-
Size
63KB
-
MD5
77d4c97adec12a2bc31e14482231036d
-
SHA1
ec2082e39537ff8633585faf03a510264eb14b69
-
SHA256
c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669
-
SHA512
90d15de3d731912c60ba38b390807063b77df75a0a0442f9072b951794b5c4217c8b7601dbf8a905bac9ea53e734015957c2c347cb7f35a9848f73179dbc3ba5
-
SSDEEP
1536:G3GNisbcrQ3KXyV+LKhpadsNbRPLN8GQhTUVYC3EWz:bN0r3XyamrNdPR8GcYEWz
Malware Config
Extracted
njrat
0.7d
Mourad
halimoullah.no-ip.org:1234
0e38f0c0b1d3bb006f8fbc6faf254716
-
reg_key
0e38f0c0b1d3bb006f8fbc6faf254716
-
splitter
|'|'|
Signatures
-
Njrat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2124 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2124 AcroRd32.exe 2124 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2540 2592 c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe 30 PID 2592 wrote to memory of 2540 2592 c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe 30 PID 2592 wrote to memory of 2540 2592 c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe 30 PID 2592 wrote to memory of 2540 2592 c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe 30 PID 2592 wrote to memory of 2540 2592 c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe 30 PID 2592 wrote to memory of 2540 2592 c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe 30 PID 2592 wrote to memory of 2540 2592 c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe 30 PID 2540 wrote to memory of 2124 2540 rundll32.exe 31 PID 2540 wrote to memory of 2124 2540 rundll32.exe 31 PID 2540 wrote to memory of 2124 2540 rundll32.exe 31 PID 2540 wrote to memory of 2124 2540 rundll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe"C:\Users\Admin\AppData\Local\Temp\c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\chrome.eexe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\chrome.eexe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ecfdf0a3e43630a9c96dcf3efebf76c1
SHA1e8070490e7e59aa5e2f0370f386be1f2aa329dc6
SHA2569e5288104cfe7772b04420ec5d481f4ea142ca1172c02f76c84afcddb2a197bd
SHA5122e074c9db494ef51f705433f33115b9512830581279010d571915397f44e2e025431223d4357472bff70fbe8d16aa69533a4ca601c4336d57bfe277102d3779a
-
Filesize
63KB
MD577d4c97adec12a2bc31e14482231036d
SHA1ec2082e39537ff8633585faf03a510264eb14b69
SHA256c244bb2feb841188f383f4f5c0c2f5b6544808168f2f2ceaadf3eaefeeecd669
SHA51290d15de3d731912c60ba38b390807063b77df75a0a0442f9072b951794b5c4217c8b7601dbf8a905bac9ea53e734015957c2c347cb7f35a9848f73179dbc3ba5