Analysis
-
max time kernel
102s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 13:03
Behavioral task
behavioral1
Sample
29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe
Resource
win7-20240903-en
General
-
Target
29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe
-
Size
43KB
-
MD5
f3c6a39bbcdf14222e36ac9fcb1764c0
-
SHA1
52d80a72eaefd786e069e888b11c6d7bd8c4ce97
-
SHA256
29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12
-
SHA512
a43e887a4033c0aa580af5c92afa9698b6b7f3d1b7aeae88a4ddb3cd741588c34c2160bfe35b19d39a1b901c76e2c9970297e7947386b6190777f272e876315b
-
SSDEEP
384:1ZyLaNU1SoycwJepJ3WhYYWOVOKEbv5Y8Gzz0Iij+ZsNO3PlpJKkkjh/TzF7pWnx:fJqglcwJEDMOtBY/uXQ/o2+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
RoShaders
127.0.0.1:8848
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 2292 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 AcroRd32.exe 2292 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2472 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 30 PID 1728 wrote to memory of 2472 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 30 PID 1728 wrote to memory of 2472 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 30 PID 1728 wrote to memory of 2472 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 30 PID 1728 wrote to memory of 2472 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 30 PID 1728 wrote to memory of 2472 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 30 PID 1728 wrote to memory of 2472 1728 29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe 30 PID 2472 wrote to memory of 2292 2472 rundll32.exe 31 PID 2472 wrote to memory of 2292 2472 rundll32.exe 31 PID 2472 wrote to memory of 2292 2472 rundll32.exe 31 PID 2472 wrote to memory of 2292 2472 rundll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe"C:\Users\Admin\AppData\Local\Temp\29d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\RoShaders2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\RoShaders"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55a1e5eda5ecfb9d2f5a2b0d052ae1834
SHA1a1758325b6efaa5a2c76653e1e2b7efd618a43c8
SHA256d389129c3a32984a908fbd291e8e97356c38c1af6aca0cddf060a38d59b4c5d6
SHA5120d5f4b9028cdad46c01cc6f579a3f3a6813ae5fc6aba9c0db61f04e533a27e4f820f52605af297bdce60c69cb8db2671033977c6e19d2e4990d83f615e94c316
-
Filesize
43KB
MD5f3c6a39bbcdf14222e36ac9fcb1764c0
SHA152d80a72eaefd786e069e888b11c6d7bd8c4ce97
SHA25629d75037536856471105669f9ddb32362bd9b319c03cce30e88648700c816b12
SHA512a43e887a4033c0aa580af5c92afa9698b6b7f3d1b7aeae88a4ddb3cd741588c34c2160bfe35b19d39a1b901c76e2c9970297e7947386b6190777f272e876315b