Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    17-04-2021 12:32

General

  • Target

    Xenos/Xenos64.exe

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xenos\Xenos64.exe
    "C:\Users\Admin\AppData\Local\Temp\Xenos\Xenos64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\Xenos64.exe
      "C:\Users\Admin\AppData\Local\Temp\Xenos64.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1964
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\svhost.exe
        "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svhost.exe" "svhost.exe" ENABLE
          4⤵
            PID:1604

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Xenos64.exe
      MD5

      6f0dd4150efddfc20b70401479964211

      SHA1

      e97c802a8013b13fb91a831b779ade7c3ca6870b

      SHA256

      0e6d59fcdf8f143e23b076cc8380d6d23324839ae4f91793133b600e7eb76eb9

      SHA512

      d8e823876507cd10b8c176e502c99bb80d52742eaa7c0e319b2a5c1f605de962505bf09950418a461fde427db34a59dbb67cbb4a6045f44d243c77945aebd0fb

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      MD5

      ed0b19f0b25d20c2ca2d7ddd9b51fafb

      SHA1

      9cc4d137b50d2653782bd6e4793452ac393e0fa3

      SHA256

      87429a3c6557a11a1e83398d65f54e1fe12945ed3df86d67762bb0e29ad492fb

      SHA512

      561ec87adec4833b29bb6d8061125656a9db4c0371f66f608deb75806525d01a987b1a42c1c43f3f3d1eebc88ebc684fd6189008ee5f4d1edd7cd07fe092ed0f

    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      MD5

      ed0b19f0b25d20c2ca2d7ddd9b51fafb

      SHA1

      9cc4d137b50d2653782bd6e4793452ac393e0fa3

      SHA256

      87429a3c6557a11a1e83398d65f54e1fe12945ed3df86d67762bb0e29ad492fb

      SHA512

      561ec87adec4833b29bb6d8061125656a9db4c0371f66f608deb75806525d01a987b1a42c1c43f3f3d1eebc88ebc684fd6189008ee5f4d1edd7cd07fe092ed0f

    • \??\c:\users\admin\appdata\local\temp\svchost.exe
      MD5

      ed0b19f0b25d20c2ca2d7ddd9b51fafb

      SHA1

      9cc4d137b50d2653782bd6e4793452ac393e0fa3

      SHA256

      87429a3c6557a11a1e83398d65f54e1fe12945ed3df86d67762bb0e29ad492fb

      SHA512

      561ec87adec4833b29bb6d8061125656a9db4c0371f66f608deb75806525d01a987b1a42c1c43f3f3d1eebc88ebc684fd6189008ee5f4d1edd7cd07fe092ed0f

    • \??\c:\users\admin\appdata\local\temp\svhost.exe
      MD5

      ed0b19f0b25d20c2ca2d7ddd9b51fafb

      SHA1

      9cc4d137b50d2653782bd6e4793452ac393e0fa3

      SHA256

      87429a3c6557a11a1e83398d65f54e1fe12945ed3df86d67762bb0e29ad492fb

      SHA512

      561ec87adec4833b29bb6d8061125656a9db4c0371f66f608deb75806525d01a987b1a42c1c43f3f3d1eebc88ebc684fd6189008ee5f4d1edd7cd07fe092ed0f

    • \Users\Admin\AppData\Local\Temp\Xenos64.exe
      MD5

      6f0dd4150efddfc20b70401479964211

      SHA1

      e97c802a8013b13fb91a831b779ade7c3ca6870b

      SHA256

      0e6d59fcdf8f143e23b076cc8380d6d23324839ae4f91793133b600e7eb76eb9

      SHA512

      d8e823876507cd10b8c176e502c99bb80d52742eaa7c0e319b2a5c1f605de962505bf09950418a461fde427db34a59dbb67cbb4a6045f44d243c77945aebd0fb

    • \Users\Admin\AppData\Local\Temp\Xenos64.exe
      MD5

      6f0dd4150efddfc20b70401479964211

      SHA1

      e97c802a8013b13fb91a831b779ade7c3ca6870b

      SHA256

      0e6d59fcdf8f143e23b076cc8380d6d23324839ae4f91793133b600e7eb76eb9

      SHA512

      d8e823876507cd10b8c176e502c99bb80d52742eaa7c0e319b2a5c1f605de962505bf09950418a461fde427db34a59dbb67cbb4a6045f44d243c77945aebd0fb

    • \Users\Admin\AppData\Local\Temp\svhost.exe
      MD5

      ed0b19f0b25d20c2ca2d7ddd9b51fafb

      SHA1

      9cc4d137b50d2653782bd6e4793452ac393e0fa3

      SHA256

      87429a3c6557a11a1e83398d65f54e1fe12945ed3df86d67762bb0e29ad492fb

      SHA512

      561ec87adec4833b29bb6d8061125656a9db4c0371f66f608deb75806525d01a987b1a42c1c43f3f3d1eebc88ebc684fd6189008ee5f4d1edd7cd07fe092ed0f

    • memory/552-77-0x0000000003070000-0x0000000003071000-memory.dmp
      Filesize

      4KB

    • memory/552-73-0x0000000000000000-mapping.dmp
    • memory/1604-78-0x0000000000000000-mapping.dmp
    • memory/1708-68-0x0000000075B31000-0x0000000075B33000-memory.dmp
      Filesize

      8KB

    • memory/1708-71-0x0000000000790000-0x0000000000791000-memory.dmp
      Filesize

      4KB

    • memory/1708-66-0x0000000000000000-mapping.dmp
    • memory/1964-64-0x000007FEFC391000-0x000007FEFC393000-memory.dmp
      Filesize

      8KB

    • memory/1964-62-0x0000000000000000-mapping.dmp
    • memory/1964-80-0x0000000003E80000-0x0000000003E81000-memory.dmp
      Filesize

      4KB

    • memory/1992-59-0x00000000011C0000-0x00000000011C1000-memory.dmp
      Filesize

      4KB

    • memory/1992-65-0x000000001B200000-0x000000001B202000-memory.dmp
      Filesize

      8KB