Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 07:51
Static task
static1
Behavioral task
behavioral1
Sample
bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe
Resource
win10v2004-20241007-en
General
-
Target
bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe
-
Size
126KB
-
MD5
94b772b40b8c5f50bb79b5c6dffec717
-
SHA1
926e3cc4b931413c65b45566dd33321ec0927b5e
-
SHA256
bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5
-
SHA512
b7e101959eb9c8185ab510d68f9189da6164c0d5b4ff44c1ccbfc95b2f923eb26c2811669b9e2d1c1b250e624877cfd357c5ebcf40fb6b722116fa34a58d5e3a
-
SSDEEP
3072:vuLnX/KXM/G14oxZKWcvu/jcAWgI3bUbn0K:va/8MxQKWc27c7Gn
Malware Config
Extracted
njrat
0.7d
Test
127.0.0.1:1616
e34861c344caaad773c61f8376b103c3
-
reg_key
e34861c344caaad773c61f8376b103c3
-
splitter
!^|!^
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1936 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: 33 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe Token: SeIncBasePriorityPrivilege 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1936 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe 31 PID 2396 wrote to memory of 1936 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe 31 PID 2396 wrote to memory of 1936 2396 bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe"C:\Users\Admin\AppData\Local\Temp\bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe" "bcb3d8c739f96892019a8d2cd14d6f08a4d14f912fa58680edad98eb3f76cbc5.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1936
-