Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/03/2025, 21:13
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
2fb0487c62fddc8148bb9c1e7a61ff0b
-
SHA1
166f462038f8db0cc6462c8f6de5f3098968b7da
-
SHA256
c3eecda765f66631358e23cbb02741b4e2fb2e56c76520d5a83b249ee8f929d8
-
SHA512
0fb567a204b6ed8c0104ac893168800fd4f40c3c6bebba1d446c53f5107a6b6bfea5d1d47c77f32efae765c675c976dbd64f541c671f7348100efc4659f42cc9
-
SSDEEP
1536:kdmIDn/NOryWhI0DGwsNMDmXExI3pmSm:BIDnE+v0DGwsNMDmXExI3pm
Malware Config
Signatures
-
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 4776 dllhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe Token: 33 4776 dllhost.exe Token: SeIncBasePriorityPrivilege 4776 dllhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4776 3796 Payload.exe 83 PID 3796 wrote to memory of 4776 3796 Payload.exe 83 PID 3796 wrote to memory of 4776 3796 Payload.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\dllhost.exe"C:\Users\Admin\dllhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD52fb0487c62fddc8148bb9c1e7a61ff0b
SHA1166f462038f8db0cc6462c8f6de5f3098968b7da
SHA256c3eecda765f66631358e23cbb02741b4e2fb2e56c76520d5a83b249ee8f929d8
SHA5120fb567a204b6ed8c0104ac893168800fd4f40c3c6bebba1d446c53f5107a6b6bfea5d1d47c77f32efae765c675c976dbd64f541c671f7348100efc4659f42cc9