Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 05:33
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Payload.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
Payload.exe
-
Size
71KB
-
MD5
059beef828b555a0d90d944d26f8bf71
-
SHA1
3194f8247da47781a652c779e6827be3f7d1caa7
-
SHA256
53870cafc093a006bcff926989904193a84757a3bd3bb6bc9d2f02bb897f4e81
-
SHA512
31f59078fc35f7d40aca5d3a9c81475be5312cd66e27d63c8ff557591fadd74e652c09a8bb638967f8f9e88e4ae727f3686451ccbc7e616e37e4e3cd65637b70
-
SSDEEP
1536:OIeFWPjlcKco3Skqg9fZIc9Urt5f2F0iZAi9aIftfKyxT04GNrztiBVXiKMt9PMn:nYo9fZIftlIfrT04xX/q9PmaF9bI
Malware Config
Extracted
njrat
Platinum
Victim
http://afwa2w3fafs.store/BURHAN-ALASSAD:88
svchost.exe
-
reg_key
svchost.exe
-
splitter
|Ghost|
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe Token: 33 2680 Payload.exe Token: SeIncBasePriorityPrivilege 2680 Payload.exe