Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 02:36

General

  • Target

    70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe

  • Size

    25KB

  • MD5

    3386d440d3907b4c9322f7842a914026

  • SHA1

    31402ac6467747beaea5957dffcba88d7ca9a249

  • SHA256

    70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2

  • SHA512

    d2f2cf13448960e4a71de312d9f8edc9083b4964394407c98ac06108aa6d27d8f0c1f6ccabb3e816896585b896425e18cf9760ccccd0315df970446d4dce0abd

  • SSDEEP

    768:svpzorREU6cTM8R0pm8TGaUqKUr0QenOXNolnQ:QkRd6cY8RiHNZYWXNr

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

82.193.104.21:5137

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe
    "C:\Users\Admin\AppData\Local\Temp\70c8b18ece14adc1d775e9eb5c4de116f2d4a283818ad69dd967fc1127130ec2.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:4476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4476-0-0x00007FF8D0503000-0x00007FF8D0505000-memory.dmp

    Filesize

    8KB

  • memory/4476-1-0x0000000000150000-0x0000000000158000-memory.dmp

    Filesize

    32KB

  • memory/4476-2-0x0000000000A00000-0x0000000000A12000-memory.dmp

    Filesize

    72KB

  • memory/4476-3-0x00007FF8D0500000-0x00007FF8D0FC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4476-5-0x00007FF8D0503000-0x00007FF8D0505000-memory.dmp

    Filesize

    8KB

  • memory/4476-6-0x00007FF8D0500000-0x00007FF8D0FC1000-memory.dmp

    Filesize

    10.8MB