Analysis
-
max time kernel
897s -
max time network
900s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/03/2025, 20:45
General
-
Target
Payload1234.exe
-
Size
54KB
-
MD5
036b3d9a4d952a24395e7bb611c343fc
-
SHA1
c22e1bd6a08cb355af0916d071c1bca492b71948
-
SHA256
4f04da82187c751bef7418649b8581ae26258687eb437293bc1580339de7a414
-
SHA512
2a0e6508fba8adec93929db094e664b252cfa635694a7d2e72c4b7d3ba2be6d30c37e5de17559dd728fdeda27fd5f843247a197339255b1d2c178dea34c6652b
-
SSDEEP
768:GmAQsCB2EsltNnVpladJr3N8JSNGExWQG35bmaePD5Pv42XXJdxIEpmJg:GmJtGtNnpabrmGGWWQcGD/X3xIEpmJg
Malware Config
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload1234.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1680 Payload1234.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe Token: SeIncBasePriorityPrivilege 1680 Payload1234.exe Token: 33 1680 Payload1234.exe