Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-12-2020 14:59

General

  • Target

    6aa41422717869166e3c3fca64a6282b.exe

  • Size

    1.2MB

  • MD5

    6aa41422717869166e3c3fca64a6282b

  • SHA1

    cda8fe84bb2841ec7e541651411228e779a81696

  • SHA256

    9b33e4cbdb866cf26e5d30d6929b86f01b21eb9e78996237565ba1e088160893

  • SHA512

    48e25773818f13f14f4183af0273d9ffc2254801323d4351ce5843df2dba3e926c4acc52ede87e0952e7abea27d8199c18f5a73e3e1188451f45ffe24dfffeef

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

magraotm.ddns.net:1177

Mutex

dd3191152a7e6633d26d1d8422e4e214

Attributes
  • reg_key

    dd3191152a7e6633d26d1d8422e4e214

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aa41422717869166e3c3fca64a6282b.exe
    "C:\Users\Admin\AppData\Local\Temp\6aa41422717869166e3c3fca64a6282b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\cfPT_launcher.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\Lammer.exe
      "C:\Users\Admin\AppData\Local\Temp\Lammer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Users\Admin\AppData\Roaming\explorer.exe
        "C:\Users\Admin\AppData\Roaming\explorer.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\explorer.exe" "explorer.exe" ENABLE
          4⤵
            PID:1512

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Lammer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • C:\Users\Admin\AppData\Local\Temp\Lammer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • C:\Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      MD5

      cb1545a63ba5b93f8bf6d9953ad49f2e

      SHA1

      e98146a123498d431da88a84d8c4bff43849f86e

      SHA256

      c9d4e7af0f6a5c24c4617fdc35b56f147b11c85afc3f06c7d9dad105c274d104

      SHA512

      2e099a2bf75000029f08e37d6c95072b25c6506adf6415533d5759b152fbef481ca2f6027e55d24e07f808bc68099e9ba58d76ab585edb55c67735c55a64cb29

    • C:\Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      MD5

      cb1545a63ba5b93f8bf6d9953ad49f2e

      SHA1

      e98146a123498d431da88a84d8c4bff43849f86e

      SHA256

      c9d4e7af0f6a5c24c4617fdc35b56f147b11c85afc3f06c7d9dad105c274d104

      SHA512

      2e099a2bf75000029f08e37d6c95072b25c6506adf6415533d5759b152fbef481ca2f6027e55d24e07f808bc68099e9ba58d76ab585edb55c67735c55a64cb29

    • C:\Users\Admin\AppData\Roaming\explorer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • C:\Users\Admin\AppData\Roaming\explorer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • \Users\Admin\AppData\Local\Temp\Lammer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • \Users\Admin\AppData\Local\Temp\Lammer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • \Users\Admin\AppData\Local\Temp\Lammer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • \Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      MD5

      cb1545a63ba5b93f8bf6d9953ad49f2e

      SHA1

      e98146a123498d431da88a84d8c4bff43849f86e

      SHA256

      c9d4e7af0f6a5c24c4617fdc35b56f147b11c85afc3f06c7d9dad105c274d104

      SHA512

      2e099a2bf75000029f08e37d6c95072b25c6506adf6415533d5759b152fbef481ca2f6027e55d24e07f808bc68099e9ba58d76ab585edb55c67735c55a64cb29

    • \Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      MD5

      cb1545a63ba5b93f8bf6d9953ad49f2e

      SHA1

      e98146a123498d431da88a84d8c4bff43849f86e

      SHA256

      c9d4e7af0f6a5c24c4617fdc35b56f147b11c85afc3f06c7d9dad105c274d104

      SHA512

      2e099a2bf75000029f08e37d6c95072b25c6506adf6415533d5759b152fbef481ca2f6027e55d24e07f808bc68099e9ba58d76ab585edb55c67735c55a64cb29

    • \Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      MD5

      cb1545a63ba5b93f8bf6d9953ad49f2e

      SHA1

      e98146a123498d431da88a84d8c4bff43849f86e

      SHA256

      c9d4e7af0f6a5c24c4617fdc35b56f147b11c85afc3f06c7d9dad105c274d104

      SHA512

      2e099a2bf75000029f08e37d6c95072b25c6506adf6415533d5759b152fbef481ca2f6027e55d24e07f808bc68099e9ba58d76ab585edb55c67735c55a64cb29

    • \Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      MD5

      cb1545a63ba5b93f8bf6d9953ad49f2e

      SHA1

      e98146a123498d431da88a84d8c4bff43849f86e

      SHA256

      c9d4e7af0f6a5c24c4617fdc35b56f147b11c85afc3f06c7d9dad105c274d104

      SHA512

      2e099a2bf75000029f08e37d6c95072b25c6506adf6415533d5759b152fbef481ca2f6027e55d24e07f808bc68099e9ba58d76ab585edb55c67735c55a64cb29

    • \Users\Admin\AppData\Local\Temp\cfPT_launcher.exe
      MD5

      cb1545a63ba5b93f8bf6d9953ad49f2e

      SHA1

      e98146a123498d431da88a84d8c4bff43849f86e

      SHA256

      c9d4e7af0f6a5c24c4617fdc35b56f147b11c85afc3f06c7d9dad105c274d104

      SHA512

      2e099a2bf75000029f08e37d6c95072b25c6506adf6415533d5759b152fbef481ca2f6027e55d24e07f808bc68099e9ba58d76ab585edb55c67735c55a64cb29

    • \Users\Admin\AppData\Roaming\explorer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • \Users\Admin\AppData\Roaming\explorer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • \Users\Admin\AppData\Roaming\explorer.exe
      MD5

      ad08ade0dfb42053078f3cf19e7739e3

      SHA1

      8f132309aae086d4c19e7a1c1d49a67222bc2777

      SHA256

      7d2a1a56db084c60f9a611ebd33b021ea469e7e9696891608c45cf61939116bd

      SHA512

      6ca9c1dd53fab21a93882c326f378073ed884162e1dd8e8a9674c7993663c44e9a98b8a3129f1233d6db4f40e573b51772fef341afc086e6fb34829440199cd1

    • memory/612-6-0x0000000000000000-mapping.dmp
    • memory/1512-27-0x0000000000000000-mapping.dmp
    • memory/1528-9-0x0000000000000000-mapping.dmp
    • memory/1728-18-0x000007FEF7B20000-0x000007FEF7D9A000-memory.dmp
      Filesize

      2.5MB

    • memory/1752-21-0x0000000000000000-mapping.dmp