Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 11:32
Static task
static1
Behavioral task
behavioral1
Sample
da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe
Resource
win10v2004-20241007-en
General
-
Target
da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe
-
Size
120KB
-
MD5
cf28cd2e4d302f8084428ae2154a1090
-
SHA1
438ea7a74a106f663955707affc9ba1ccdf10d18
-
SHA256
da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1
-
SHA512
f2ac8ae77cef7703e17e113fe9e0f46082b1bb1916677df2aa9dd6f904e44bc90f477d12278a3764ad9872e30940fd0b11ac9f3db12f1db03321f3627f5179da
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVg/:P5eznsjsguGDFqGZ2rDLy
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1632 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2144 chargeable.exe 2800 chargeable.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe 1992 da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe" da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2144 set thread context of 2800 2144 chargeable.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe Token: 33 2800 chargeable.exe Token: SeIncBasePriorityPrivilege 2800 chargeable.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2144 1992 da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe 31 PID 1992 wrote to memory of 2144 1992 da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe 31 PID 1992 wrote to memory of 2144 1992 da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe 31 PID 1992 wrote to memory of 2144 1992 da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe 31 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2144 wrote to memory of 2800 2144 chargeable.exe 32 PID 2800 wrote to memory of 1632 2800 chargeable.exe 33 PID 2800 wrote to memory of 1632 2800 chargeable.exe 33 PID 2800 wrote to memory of 1632 2800 chargeable.exe 33 PID 2800 wrote to memory of 1632 2800 chargeable.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe"C:\Users\Admin\AppData\Local\Temp\da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fa84e4bcc92aa5db735ab50711040cde
SHA1084f1cb4c47fdd3be1c833f58359ec8e16f61eb4
SHA2566d7205e794fde4219a62d9692ecddf612663a5cf20399e79be87b851fca4ca33
SHA512261a327ed1dffd4166e215d17bfd867df5b77017ba72c879fb2675cfb8eef48b374f6de41da0e51ba7adb9c0165bb2c831840603e873f6429963afd0cb93007f
-
Filesize
1KB
MD53e3aed1c0ba46c98a8ef6b3bec083998
SHA18df2ba67925f2c9580ead34fc567acd35c55b416
SHA2563fab079f84b987b1a1e305228bd9d2c7dc9a4033b62d3715073c009391fc949f
SHA512f0afb50c3ca2843e0dde736e5ce6d327ad2b70ae3e04c46c658878208dbd242059efc414f8eff22e9e6034a4a4948b34bdd612c5156c3d9a7fcbd38238066b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE
Filesize264B
MD5999f53677e6d22a84ada0c8fb6207cfe
SHA1b8899411fac1679a724943e6c28a517e65e33d70
SHA256579b1038cab1efeccbd39df0b64a11b3091c99dfa8c9fd680612121ba74317d4
SHA5126cb2cceb41def93000df94d6f9a8ce520cc7e649346d71223ce5f3be5adbc82f9d923ec5dde1824864ddc456b6b8d2da5c369a0ec0b534add4938f4cb635bb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe7df03ce885aee8bd3f87c92272a12
SHA1b4d3718fb8f6bf554eee00d564a6fcc261b4f36c
SHA2565631bd8ad92f2388aec0931e7fc044e8540f7e7877ad5639a1d268fdebd01166
SHA5125caff0bca6183bd7999e2924ca9768161d85acedc414a7a508bc4edb374b3f03a8e9d2b9aba43c06f14ad416a8fc5c07494ef71f78c74027d1e6c85b20822a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f24467f60bfc70d55d92ea662e5dbb8
SHA1a504a3b2179b54edc36464849905ac7a6b6c057b
SHA256412702d0e933c454d7d5f8cc32f386af7447a6f2b03689697072c032be9d8bc7
SHA512692ee5ce164cd57b2b47e4fc274a6758162d95c28f6e2c14e3fb46659bbe5bd07fe5fbc8a9ff36beb813414efee99a1baa5462d4ba8f118264167902dad66a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5dc0c9f5fa80532fa0bbd98739a657
SHA14481bf1a5765a344211cfd79df873f0de776fd08
SHA256ba506b3dc7f41aff81b6bd105a7347e0769021f3193323e4fb968837e6922c9b
SHA51277ff2b52fe5f257e913f67bbac4ae201ee46a7b7256a714890529d6002e84d45a34b8ae644f73e2dfa6561bf2e8526567bf077ebff0cc78a14c872c0e77ebc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956
Filesize252B
MD517e5aefac771a2400acd0af882587afb
SHA123316ae8f0396f27f9fca68214c9ef4f4dda6340
SHA2567b2debc0d1be3867aafe4e47c2b1461dcaf6f51454a298a05594fbfc7fd1cc39
SHA512dfe5e7b56e0f3fa333b3c0702277e3e9c7288a9c30d82e212e452df305d2f37701092dd4a691242256a5797f28a1d83353ce3d20ee7a15e41394a9d4f792af69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
120KB
MD5f304da09022da7fea88436a2223fbe83
SHA16a8ba930427ef189b9ab7ebaa41c37be3870219b
SHA2566b7cc83a7e84e88d68295d2a14f640ff911d6f9f14595c9e8d14eeaef72f6f6c
SHA51207e564f7780967d37a03d2648125f724c9de2529ceec16691c823b8bb34b731829a39785f1fde6c6c0f76a6b1a2d243488a1a01e59b40f28ca8867d4ea21a948