Analysis

  • max time kernel
    103s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2025, 16:45

General

  • Target

    4088ab627e6c5ddb085e2c2e256e4e94d2cc51f5bd31ee01cd6e195fd3c26a23.exe

  • Size

    43KB

  • MD5

    0122de50623c1d14a05f4f5acb81ac58

  • SHA1

    83277b3119168a8417797119aa9c17b5a79b781a

  • SHA256

    4088ab627e6c5ddb085e2c2e256e4e94d2cc51f5bd31ee01cd6e195fd3c26a23

  • SHA512

    082df95de909c3304448b6e8aa95320ec0eb335772a3f0b65655d602e33b9ea7b9e1ff00eec971edac181ecc50bcb7bfbd83085583ed150fe75b03df6b8d0dad

  • SSDEEP

    384:eZy+Hl9n1iDcsyEqt3ptvwcsECGgOE3zcQij2Z2NO3PlpJKkkjh/TzF7pWnPmgX7:k99nU4pEqt5tvt7gfu9Q/oi7+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:6754

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4088ab627e6c5ddb085e2c2e256e4e94d2cc51f5bd31ee01cd6e195fd3c26a23.exe
    "C:\Users\Admin\AppData\Local\Temp\4088ab627e6c5ddb085e2c2e256e4e94d2cc51f5bd31ee01cd6e195fd3c26a23.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 784
      2⤵
      • Program crash
      PID:5080
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2244 -ip 2244
    1⤵
      PID:2436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2244-0-0x000000007512E000-0x000000007512F000-memory.dmp

      Filesize

      4KB

    • memory/2244-1-0x0000000000BD0000-0x0000000000BE2000-memory.dmp

      Filesize

      72KB