General
-
Target
officedeploymenttool_18227-20162.exe
-
Size
37.5MB
-
Sample
250201-wdpp2atjdx
-
MD5
d85711a9d52862c3e538d79217244059
-
SHA1
3ed74e38b09b34db3add5fb2c1f4debb66651987
-
SHA256
b84d06eb8b490a54bdd252a58d25eb54f5580018ecbf3066e0cd5d03ef284c96
-
SHA512
7858369ea6aead310ce6524699301958167914453e7d83849b62088e58c8ef318a75e14da637434340f15e01acbe623337a7d1a06e15ea18c3c32b15d8e843ae
-
SSDEEP
786432:vhP/Hle221VnfaWCXcbWDMzISiBddts4s0ACgz27e6fg8/KQxg6U5SeE+nz2E:vBlVsCFhDMzwds4s0oZ+g8CQxfYX6
Static task
static1
Behavioral task
behavioral1
Sample
officedeploymenttool_18227-20162.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
officedeploymenttool_18227-20162.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
njrat
0.7d
Cyka
mj2025.ddns.net:5552
c6c0c67fa02a1b5dbba63788457d850d
-
reg_key
c6c0c67fa02a1b5dbba63788457d850d
-
splitter
|'|'|
Targets
-
-
Target
officedeploymenttool_18227-20162.exe
-
Size
37.5MB
-
MD5
d85711a9d52862c3e538d79217244059
-
SHA1
3ed74e38b09b34db3add5fb2c1f4debb66651987
-
SHA256
b84d06eb8b490a54bdd252a58d25eb54f5580018ecbf3066e0cd5d03ef284c96
-
SHA512
7858369ea6aead310ce6524699301958167914453e7d83849b62088e58c8ef318a75e14da637434340f15e01acbe623337a7d1a06e15ea18c3c32b15d8e843ae
-
SSDEEP
786432:vhP/Hle221VnfaWCXcbWDMzISiBddts4s0ACgz27e6fg8/KQxg6U5SeE+nz2E:vBlVsCFhDMzwds4s0oZ+g8CQxfYX6
-
Njrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
XMRig Miner payload
-
Contacts a large (841) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Network Service Discovery
1Process Discovery
1Query Registry
4System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1