Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 02:36

General

  • Target

    70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe

  • Size

    25KB

  • MD5

    3386d440d3907b4c9322f7842a914026

  • SHA1

    31402ac6467747beaea5957dffcba88d7ca9a249

  • SHA256

    70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2

  • SHA512

    d2f2cf13448960e4a71de312d9f8edc9083b4964394407c98ac06108aa6d27d8f0c1f6ccabb3e816896585b896425e18cf9760ccccd0315df970446d4dce0abd

  • SSDEEP

    768:svpzorREU6cTM8R0pm8TGaUqKUr0QenOXNolnQ:QkRd6cY8RiHNZYWXNr

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

82.193.104.21:5137

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe
    "C:\Users\Admin\AppData\Local\Temp\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/804-0-0x000007FEF5193000-0x000007FEF5194000-memory.dmp

    Filesize

    4KB

  • memory/804-1-0x00000000012F0000-0x00000000012F8000-memory.dmp

    Filesize

    32KB

  • memory/804-2-0x0000000000240000-0x0000000000252000-memory.dmp

    Filesize

    72KB

  • memory/804-3-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-5-0x000007FEF5193000-0x000007FEF5194000-memory.dmp

    Filesize

    4KB

  • memory/804-6-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB