Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
14-01-2025 15:22
Behavioral task
behavioral1
Sample
botnet.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
botnet.exe
-
Size
55KB
-
MD5
75c3c6f848f99103c46d785d1a488138
-
SHA1
3f75be65932cec817261d8a5e4c26ebd643bb07b
-
SHA256
33d3d6d79232d61d88f214d83d6eab25ad9c40aff24045745795e97955388420
-
SHA512
66e7dfaabc302b4bea87760869a12d50e9e9657485b14af1bdea7334f3a441675d8c4cd307109e28b6f14962c3d20e7e005ab68562b1ebe6ba6b17bdc246bc50
-
SSDEEP
1536:D/pMDnE4uNRty4XzPhhDVwsNMDwXExI3pm1Om:dMDnlYk4XdhDVwsNMDwXExI3pm
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
2.tcp.eu.ngrok.io:14206
414bf8bf8acc3fbb7978d9d782a996a1
-
reg_key
414bf8bf8acc3fbb7978d9d782a996a1
-
splitter
Y262SUCZ4UJJ
Signatures
-
Njrat family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\414bf8bf8acc3fbb7978d9d782a996a1.exe botnet.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\414bf8bf8acc3fbb7978d9d782a996a1.exe botnet.exe -
Executes dropped EXE 2 IoCs
pid Process 1140 botnet.exe 2896 botnet.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1576956541-1869783662-2981982442-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\414bf8bf8acc3fbb7978d9d782a996a1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\botnet.exe\" .." botnet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\414bf8bf8acc3fbb7978d9d782a996a1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\botnet.exe\" .." botnet.exe -
pid Process 2548 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 2.tcp.eu.ngrok.io 27 2.tcp.eu.ngrok.io -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2912 sc.exe 4504 sc.exe 4928 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language botnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language botnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language botnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1924 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe 2424 botnet.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2424 botnet.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeDebugPrivilege 2424 botnet.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeIncreaseQuotaPrivilege 2548 powershell.exe Token: SeSecurityPrivilege 2548 powershell.exe Token: SeTakeOwnershipPrivilege 2548 powershell.exe Token: SeLoadDriverPrivilege 2548 powershell.exe Token: SeSystemProfilePrivilege 2548 powershell.exe Token: SeSystemtimePrivilege 2548 powershell.exe Token: SeProfSingleProcessPrivilege 2548 powershell.exe Token: SeIncBasePriorityPrivilege 2548 powershell.exe Token: SeCreatePagefilePrivilege 2548 powershell.exe Token: SeBackupPrivilege 2548 powershell.exe Token: SeRestorePrivilege 2548 powershell.exe Token: SeShutdownPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeSystemEnvironmentPrivilege 2548 powershell.exe Token: SeRemoteShutdownPrivilege 2548 powershell.exe Token: SeUndockPrivilege 2548 powershell.exe Token: SeManageVolumePrivilege 2548 powershell.exe Token: 33 2548 powershell.exe Token: 34 2548 powershell.exe Token: 35 2548 powershell.exe Token: 36 2548 powershell.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: SeDebugPrivilege 1140 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: SeDebugPrivilege 2896 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe Token: 33 2424 botnet.exe Token: SeIncBasePriorityPrivilege 2424 botnet.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3960 2424 botnet.exe 81 PID 2424 wrote to memory of 3960 2424 botnet.exe 81 PID 2424 wrote to memory of 3960 2424 botnet.exe 81 PID 2424 wrote to memory of 3332 2424 botnet.exe 83 PID 2424 wrote to memory of 3332 2424 botnet.exe 83 PID 2424 wrote to memory of 3332 2424 botnet.exe 83 PID 3332 wrote to memory of 2548 3332 cmd.exe 85 PID 3332 wrote to memory of 2548 3332 cmd.exe 85 PID 3332 wrote to memory of 2548 3332 cmd.exe 85 PID 2424 wrote to memory of 1596 2424 botnet.exe 86 PID 2424 wrote to memory of 1596 2424 botnet.exe 86 PID 2424 wrote to memory of 1596 2424 botnet.exe 86 PID 1596 wrote to memory of 2912 1596 cmd.exe 88 PID 1596 wrote to memory of 2912 1596 cmd.exe 88 PID 1596 wrote to memory of 2912 1596 cmd.exe 88 PID 2424 wrote to memory of 3816 2424 botnet.exe 89 PID 2424 wrote to memory of 3816 2424 botnet.exe 89 PID 2424 wrote to memory of 3816 2424 botnet.exe 89 PID 3816 wrote to memory of 4504 3816 cmd.exe 91 PID 3816 wrote to memory of 4504 3816 cmd.exe 91 PID 3816 wrote to memory of 4504 3816 cmd.exe 91 PID 2424 wrote to memory of 1776 2424 botnet.exe 92 PID 2424 wrote to memory of 1776 2424 botnet.exe 92 PID 2424 wrote to memory of 1776 2424 botnet.exe 92 PID 1776 wrote to memory of 4928 1776 cmd.exe 95 PID 1776 wrote to memory of 4928 1776 cmd.exe 95 PID 1776 wrote to memory of 4928 1776 cmd.exe 95 PID 2424 wrote to memory of 5008 2424 botnet.exe 96 PID 2424 wrote to memory of 5008 2424 botnet.exe 96 PID 2424 wrote to memory of 5008 2424 botnet.exe 96 PID 2424 wrote to memory of 4072 2424 botnet.exe 98 PID 2424 wrote to memory of 4072 2424 botnet.exe 98 PID 2424 wrote to memory of 4072 2424 botnet.exe 98 PID 2424 wrote to memory of 3996 2424 botnet.exe 100 PID 2424 wrote to memory of 3996 2424 botnet.exe 100 PID 2424 wrote to memory of 3996 2424 botnet.exe 100 PID 3996 wrote to memory of 1924 3996 cmd.exe 102 PID 3996 wrote to memory of 1924 3996 cmd.exe 102 PID 3996 wrote to memory of 1924 3996 cmd.exe 102 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3960 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\botnet.exe"C:\Users\Admin\AppData\Local\Temp\botnet.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\botnet.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3960
-
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc query windefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\sc.exesc query windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop windefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\sc.exesc stop windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete windefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\sc.exesc delete windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4928
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Local\Temp\botnet.exe2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4072
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\reg.exereg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\botnet.exe"C:\Users\Admin\AppData\Local\Temp\botnet.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
C:\Users\Admin\AppData\Local\Temp\botnet.exe"C:\Users\Admin\AppData\Local\Temp\botnet.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2896
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319B
MD5cdab7719c71b2844a3e7ff9e41894b8a
SHA18e6e0e55695e468eb3c237f21340c9d30cab922c
SHA256e84a57ed5465aaca393476f6271a2413dddad154cbae40827c4639bfc0b3e3eb
SHA512ec92e8fc3ce02336eea401f9db823ac0a2ad87bb41130f493e72f3c5ca100a461d6296a710afcc93e1fe1fc8630c5e0029e17f58583520077a3c80ad794d9dc9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
55KB
MD575c3c6f848f99103c46d785d1a488138
SHA13f75be65932cec817261d8a5e4c26ebd643bb07b
SHA25633d3d6d79232d61d88f214d83d6eab25ad9c40aff24045745795e97955388420
SHA51266e7dfaabc302b4bea87760869a12d50e9e9657485b14af1bdea7334f3a441675d8c4cd307109e28b6f14962c3d20e7e005ab68562b1ebe6ba6b17bdc246bc50