Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 19:08
Static task
static1
Behavioral task
behavioral1
Sample
460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe
Resource
win10v2004-20241007-en
General
-
Target
460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe
-
Size
328KB
-
MD5
92ab6d9ac2de2b607b8d04800b71c4b2
-
SHA1
b3bad52c795198c08c1e3f68e198450a40f4831a
-
SHA256
460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660
-
SHA512
fb6a845dc7ae17c557ec51f9b146a83f5c95b10ad96663eb26312b132038db5f3031d92046468deb3c4f22ce7ea989a7027416a43c87aeae6902786fab196b3f
-
SSDEEP
6144:/bbs8miuWxBn061wjr36UIU+yoTiKVpwCbC/ry7YOTD0zJ140QKAhFUT:jgrTMn061M36RUOTvpwpNO/0Y0QKA0T
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:777
9fd0cc59880f3102204422ac9ab5c969
-
reg_key
9fd0cc59880f3102204422ac9ab5c969
-
splitter
|'|'|
Signatures
-
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 2712 server.exe -
Loads dropped DLL 1 IoCs
pid Process 1308 RegAsm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qpoXH4igNi5i5TAp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe" 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 2264 wrote to memory of 1308 2264 460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe 30 PID 1308 wrote to memory of 2712 1308 RegAsm.exe 32 PID 1308 wrote to memory of 2712 1308 RegAsm.exe 32 PID 1308 wrote to memory of 2712 1308 RegAsm.exe 32 PID 1308 wrote to memory of 2712 1308 RegAsm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe"C:\Users\Admin\AppData\Local\Temp\460f26dca696e74045670dee102ad0fc60705f500d5f716140e26f144da6d660.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9