Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 01:43
Static task
static1
Behavioral task
behavioral1
Sample
00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe
Resource
win10v2004-20250129-en
General
-
Target
00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe
-
Size
115KB
-
MD5
ae9bf5e79a480edb4bdabeef0a075810
-
SHA1
3e785040bc7ed878d818322581061bd20934b84c
-
SHA256
00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51
-
SHA512
1fa68d37a3d258bf4cc9bed0144492e501e12573616e22a8b4b36ef31abf1058ef33480264833728a371963d44f7c7f406eef22d102636687965cf416a0ba837
-
SSDEEP
3072:lHZ28rd2yNqfdcO6L0UQnICMce3SdJFhsz0HMib4:l1dZnQIEei3Fhsz0M
Malware Config
Extracted
njrat
im523
HacKed
agdsagds.kro.kr:1111
7bc5d4676f29fca15e68905e11aefcf9
-
reg_key
7bc5d4676f29fca15e68905e11aefcf9
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2644 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7bc5d4676f29fca15e68905e11aefcf9.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7bc5d4676f29fca15e68905e11aefcf9.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 server.exe -
Loads dropped DLL 1 IoCs
pid Process 2504 00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\7bc5d4676f29fca15e68905e11aefcf9 = "\"C:\\Users\\Admin\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7bc5d4676f29fca15e68905e11aefcf9 = "\"C:\\Users\\Admin\\server.exe\" .." server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe 2796 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 server.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2796 server.exe Token: 33 2796 server.exe Token: SeIncBasePriorityPrivilege 2796 server.exe Token: 33 2796 server.exe Token: SeIncBasePriorityPrivilege 2796 server.exe Token: 33 2796 server.exe Token: SeIncBasePriorityPrivilege 2796 server.exe Token: 33 2796 server.exe Token: SeIncBasePriorityPrivilege 2796 server.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2796 2504 00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe 31 PID 2504 wrote to memory of 2796 2504 00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe 31 PID 2504 wrote to memory of 2796 2504 00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe 31 PID 2796 wrote to memory of 2644 2796 server.exe 32 PID 2796 wrote to memory of 2644 2796 server.exe 32 PID 2796 wrote to memory of 2644 2796 server.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe"C:\Users\Admin\AppData\Local\Temp\00d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\server.exe"C:\Users\Admin\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD5ae9bf5e79a480edb4bdabeef0a075810
SHA13e785040bc7ed878d818322581061bd20934b84c
SHA25600d1bc82bc637355be482a6cd2693df6710ba30868260b88dd3275cdd8696b51
SHA5121fa68d37a3d258bf4cc9bed0144492e501e12573616e22a8b4b36ef31abf1058ef33480264833728a371963d44f7c7f406eef22d102636687965cf416a0ba837