Resubmissions

12-01-2025 12:12

250112-pdfnss1qgx 10

12-01-2025 11:45

250112-nw4mxatlap 10

Analysis

  • max time kernel
    900s
  • max time network
    896s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 12:12

General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    a7b46a226d3b4e86c6d4700ed5dee333

  • SHA1

    dfeaea8cbe59a1ec831aa288a1fc33639e8a7dd1

  • SHA256

    fb731ca97406ae6dc235b69e8bca0d87e79f5e0a1c52f9e91f1775cea148d054

  • SHA512

    3902246cba977c7dd4d74aad34a50af3250b51efe92f4010a060a3715ac3ff895a31481d18d311a1f3db5d1d248589d58a41e65d9768a95b9bb8031cab270026

  • SSDEEP

    1536:ehDT8Dn+QNoB4vZ9Vk7dwmuXKDCwsNMD+XExI3pmgm:yf8Dn+nWTVk7umuXKDCwsNMD+XExI3pm

Score
10/10

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payload.exe
    C:\Users\Admin\AppData\Local\Temp\Payload.exe cmd /c %SIGILL% "SIGTERM|SIGKILL|SIGABRT"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-0-0x0000000074CD1000-0x0000000074CD2000-memory.dmp

    Filesize

    4KB

  • memory/1740-1-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-2-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-3-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-4-0x0000000074CD0000-0x000000007527B000-memory.dmp

    Filesize

    5.7MB