Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 02:36
Static task
static1
Behavioral task
behavioral1
Sample
70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe
Resource
win10v2004-20241007-en
General
-
Target
70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe
-
Size
25KB
-
MD5
3386d440d3907b4c9322f7842a914026
-
SHA1
31402ac6467747beaea5957dffcba88d7ca9a249
-
SHA256
70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2
-
SHA512
d2f2cf13448960e4a71de312d9f8edc9083b4964394407c98ac06108aa6d27d8f0c1f6ccabb3e816896585b896425e18cf9760ccccd0315df970446d4dce0abd
-
SSDEEP
768:svpzorREU6cTM8R0pm8TGaUqKUr0QenOXNolnQ:QkRd6cY8RiHNZYWXNr
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
82.193.104.21:5137
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe\" .." 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe\" .." 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: 33 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe Token: SeIncBasePriorityPrivilege 804 70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe"C:\Users\Admin\AppData\Local\Temp\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:804