Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-02-2021 07:18

General

  • Target

    277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe

  • Size

    1.2MB

  • MD5

    6382e1ba0bdcd1a586f97e1e20f77868

  • SHA1

    2cc4ae531be8b82dccf3c4c14e326307e2926658

  • SHA256

    277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2

  • SHA512

    c87b8082c6e4e58772fc189f64c64c89ced21cee1530dbf785e3e540163821f30fe9113671e5ddab3922468713f21c0a0784de869c2863ba362e09c9a1765ad3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HNZ-SHOP

C2

*TI3LjAu*C4x:5552

Mutex

316cc8fdf2ba11b55349f6a002cabe83

Attributes
  • reg_key

    316cc8fdf2ba11b55349f6a002cabe83

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 5 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe
    "C:\Users\Admin\AppData\Local\Temp\277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Admin\AppData\Local\Temp\277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe
      "C:\Users\Admin\AppData\Local\Temp\277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Users\Admin\AppData\Local\Temp\._cache_277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Users\Admin\AppData\Local\Temp\Server.exe
          "C:\Users\Admin\AppData\Local\Temp\Server.exe"
          4⤵
          • Executes dropped EXE
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1576
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE
            5⤵
              PID:896
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1736
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:1136
            • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
              5⤵
              • Executes dropped EXE
              PID:1584

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      8f8c7dcde2d43feb843d321584f091eb

      SHA1

      322bf412068ce42bf377c896227afcc4ee633bc1

      SHA256

      c622c9ef2fb3ef6249753165d6991a0dc4f03862cdada6c52ed6f603614da667

      SHA512

      f2f73a7d18ee61413fc05a62793ea161fcf200486b2d9d4da0c4b11e3f6d92b4af7e8209f967a446e5be327027bc433c7c00a29240f6b59bd4c4945de9a785f3

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      8f8c7dcde2d43feb843d321584f091eb

      SHA1

      322bf412068ce42bf377c896227afcc4ee633bc1

      SHA256

      c622c9ef2fb3ef6249753165d6991a0dc4f03862cdada6c52ed6f603614da667

      SHA512

      f2f73a7d18ee61413fc05a62793ea161fcf200486b2d9d4da0c4b11e3f6d92b4af7e8209f967a446e5be327027bc433c7c00a29240f6b59bd4c4945de9a785f3

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      8f8c7dcde2d43feb843d321584f091eb

      SHA1

      322bf412068ce42bf377c896227afcc4ee633bc1

      SHA256

      c622c9ef2fb3ef6249753165d6991a0dc4f03862cdada6c52ed6f603614da667

      SHA512

      f2f73a7d18ee61413fc05a62793ea161fcf200486b2d9d4da0c4b11e3f6d92b4af7e8209f967a446e5be327027bc433c7c00a29240f6b59bd4c4945de9a785f3

    • C:\Users\Admin\AppData\Local\Temp\._cache_277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • C:\Users\Admin\AppData\Local\Temp\._cache_277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • \ProgramData\Synaptics\Synaptics.exe
      MD5

      8f8c7dcde2d43feb843d321584f091eb

      SHA1

      322bf412068ce42bf377c896227afcc4ee633bc1

      SHA256

      c622c9ef2fb3ef6249753165d6991a0dc4f03862cdada6c52ed6f603614da667

      SHA512

      f2f73a7d18ee61413fc05a62793ea161fcf200486b2d9d4da0c4b11e3f6d92b4af7e8209f967a446e5be327027bc433c7c00a29240f6b59bd4c4945de9a785f3

    • \ProgramData\Synaptics\Synaptics.exe
      MD5

      8f8c7dcde2d43feb843d321584f091eb

      SHA1

      322bf412068ce42bf377c896227afcc4ee633bc1

      SHA256

      c622c9ef2fb3ef6249753165d6991a0dc4f03862cdada6c52ed6f603614da667

      SHA512

      f2f73a7d18ee61413fc05a62793ea161fcf200486b2d9d4da0c4b11e3f6d92b4af7e8209f967a446e5be327027bc433c7c00a29240f6b59bd4c4945de9a785f3

    • \ProgramData\Synaptics\Synaptics.exe
      MD5

      8f8c7dcde2d43feb843d321584f091eb

      SHA1

      322bf412068ce42bf377c896227afcc4ee633bc1

      SHA256

      c622c9ef2fb3ef6249753165d6991a0dc4f03862cdada6c52ed6f603614da667

      SHA512

      f2f73a7d18ee61413fc05a62793ea161fcf200486b2d9d4da0c4b11e3f6d92b4af7e8209f967a446e5be327027bc433c7c00a29240f6b59bd4c4945de9a785f3

    • \Users\Admin\AppData\Local\Temp\._cache_277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • \Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • \Users\Admin\AppData\Local\Temp\Server.exe
      MD5

      7b1c629c3fba23c2f0da5b89818c1731

      SHA1

      10df1ce94976452ac3fc8736f41b3031d948c530

      SHA256

      956a1bd3a13f1421099325462c6b1c7a4f1ba4dafa94c8ea07bbcb2ef3994d01

      SHA512

      f225d96a3f8f464d4169525bf2ea28ff73c77031928bdaa4e8b1885a0a3db3ea6a91eac20ff7dbeb774c73d101c32d4d8bb5fa53b0e7585d43076d681369473b

    • memory/776-5-0x0000000000250000-0x0000000000253000-memory.dmp
      Filesize

      12KB

    • memory/776-3-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
      Filesize

      4KB

    • memory/776-2-0x0000000073F20000-0x000000007460E000-memory.dmp
      Filesize

      6.9MB

    • memory/896-46-0x0000000000000000-mapping.dmp
    • memory/1136-26-0x000000000049AB80-mapping.dmp
    • memory/1136-30-0x0000000000400000-0x00000000004C9000-memory.dmp
      Filesize

      804KB

    • memory/1136-31-0x0000000000080000-0x0000000000081000-memory.dmp
      Filesize

      4KB

    • memory/1576-40-0x0000000000000000-mapping.dmp
    • memory/1576-44-0x0000000000520000-0x0000000000521000-memory.dmp
      Filesize

      4KB

    • memory/1584-38-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
      Filesize

      4KB

    • memory/1584-34-0x0000000000000000-mapping.dmp
    • memory/1736-21-0x0000000000FD0000-0x0000000000FD1000-memory.dmp
      Filesize

      4KB

    • memory/1736-20-0x0000000072C50000-0x000000007333E000-memory.dmp
      Filesize

      6.9MB

    • memory/1736-16-0x0000000000000000-mapping.dmp
    • memory/1756-28-0x0000000001FD0000-0x0000000001FD1000-memory.dmp
      Filesize

      4KB

    • memory/1756-12-0x0000000000000000-mapping.dmp
    • memory/1816-45-0x000007FEF6200000-0x000007FEF647A000-memory.dmp
      Filesize

      2.5MB

    • memory/1984-6-0x0000000000400000-0x00000000004C9000-memory.dmp
      Filesize

      804KB

    • memory/1984-7-0x000000000049AB80-mapping.dmp
    • memory/1984-8-0x0000000076071000-0x0000000076073000-memory.dmp
      Filesize

      8KB

    • memory/1984-9-0x0000000000400000-0x00000000004C9000-memory.dmp
      Filesize

      804KB

    • memory/1984-10-0x0000000000080000-0x0000000000081000-memory.dmp
      Filesize

      4KB