Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11/11/2020, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe
Resource
win10v20201028
General
-
Target
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe
-
Size
23KB
-
MD5
c68fa9e0a6c46464ffc55536e04cd0cb
-
SHA1
46a01b1c1ed07b403704595b54da788f87758fba
-
SHA256
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
SHA512
89c31eeba8ae22d34496584ddc4671e4b21f83ed54e16cd3e7f66fedd36dffa1915e7d2fbfcdf7cce4bf03d68cb77d53e7f03a6b42aa796bd35f506ce2952387
Malware Config
Extracted
njrat
0.7d
cheat
4.tcp.ngrok.io:19451
efea00bfd82100063e3ba5f5434189d9
-
reg_key
efea00bfd82100063e3ba5f5434189d9
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 cheat.exe -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 1876 1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\efea00bfd82100063e3ba5f5434189d9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\cheat.exe\" .." cheat.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\efea00bfd82100063e3ba5f5434189d9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\cheat.exe\" .." cheat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe Token: 33 1784 cheat.exe Token: SeIncBasePriorityPrivilege 1784 cheat.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1784 1876 1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe 29 PID 1876 wrote to memory of 1784 1876 1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe 29 PID 1876 wrote to memory of 1784 1876 1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe 29 PID 1876 wrote to memory of 1784 1876 1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe 29 PID 1784 wrote to memory of 1300 1784 cheat.exe 30 PID 1784 wrote to memory of 1300 1784 cheat.exe 30 PID 1784 wrote to memory of 1300 1784 cheat.exe 30 PID 1784 wrote to memory of 1300 1784 cheat.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe"C:\Users\Admin\AppData\Local\Temp\1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\cheat.exe"C:\Users\Admin\AppData\Local\Temp\cheat.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\cheat.exe" "cheat.exe" ENABLE3⤵PID:1300
-
-