Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-de -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-delocale:de-deos:windows10-ltsc 2021-x64systemwindows -
submitted
25/01/2025, 17:23
General
-
Target
Server.exe
-
Size
43KB
-
MD5
1475055fabe6901885d70f3d66ac8ab8
-
SHA1
8892467128916b6b40b9d35598067a05efb3532c
-
SHA256
9befd1dd28ec8cc0d7b5255cc4debd5936192107542065108694a42334d9ab55
-
SHA512
2240b400b01cbd5bac09ca88aa404ac9684148ae8a0fb1195f2b2c1234fb0465ebc3d72695fcfccdc1e3fed58551f2822d2d995763d11159355e734569215338
-
SSDEEP
384:uTZyf9lkteXivmGUyeSRCymw5EBxE1UE+zwIij+ZsNO3PlpJKkkjh/TzF7pWnPml:udElkQyvdhe8Ce4E6uXQ/oSC+L
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
HacKed
C2
tcp://5.tcp.eu.ngrok.io:13134:7771
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5048 Server.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe Token: 33 5048 Server.exe Token: SeIncBasePriorityPrivilege 5048 Server.exe