Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    18-05-2021 10:05

General

  • Target

    b243cf67bf384a80b8de34c6e8b351bb3f6cbe2c24ef4c7168489ce0bde00e1d.exe

  • Size

    2.5MB

  • MD5

    5b5ac97705245c79b7dc5553ea9ef725

  • SHA1

    8c43d1de280dc53dad5c95d765ef78b52a81c62d

  • SHA256

    b243cf67bf384a80b8de34c6e8b351bb3f6cbe2c24ef4c7168489ce0bde00e1d

  • SHA512

    8715ae2dac65df613e5ad5715b4240a947597918caa890e4b1610166f73b75736fb536330d14e6a5fa1395f80fb37ea35aa98bf328a6d1b71354aa789a93443c

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

mywin7man.p-e.kr:200

Mutex

7321baaff10c1ea75810eb114d0daa00

Attributes
  • reg_key

    7321baaff10c1ea75810eb114d0daa00

  • splitter

    |'|'|

Extracted

Family

darkcomet

Botnet

777

C2

mywin7man.ddns.net:400

mywin7man.p-e.kr:400

Mutex

DC_MUTEX-ETJWHM7

Attributes
  • InstallPath

    windowscra.exe

  • gencode

    Pi9Netx9cyRC

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 6 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Disables RegEdit via registry modification
  • Executes dropped EXE 6 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b243cf67bf384a80b8de34c6e8b351bb3f6cbe2c24ef4c7168489ce0bde00e1d.exe
    "C:\Users\Admin\AppData\Local\Temp\b243cf67bf384a80b8de34c6e8b351bb3f6cbe2c24ef4c7168489ce0bde00e1d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Users\Admin\AppData\Local\Temp\100.EXE
      "C:\Users\Admin\AppData\Local\Temp\100.EXE"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2140
    • C:\Users\Admin\AppData\Local\Temp\200.EXE
      "C:\Users\Admin\AppData\Local\Temp\200.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Local\Temp\winlogon.exe
        "C:\Users\Admin\AppData\Local\Temp\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\winlogon.exe" "winlogon.exe" ENABLE
          4⤵
            PID:2616
      • C:\Users\Admin\AppData\Local\Temp\NJRAT V0.7D.EXE
        "C:\Users\Admin\AppData\Local\Temp\NJRAT V0.7D.EXE"
        2⤵
        • Executes dropped EXE
        PID:2660
      • C:\Users\Admin\AppData\Local\Temp\windowscra.exe
        "C:\Users\Admin\AppData\Local\Temp\windowscra.exe"
        2⤵
        • Modifies firewall policy service
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:196
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies firewall policy service
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3476
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            4⤵
              PID:1272
      • C:\Windows\SysWOW64\viprsm.exe
        C:\Windows\SysWOW64\viprsm.exe
        1⤵
        • Executes dropped EXE
        • Checks processor information in registry
        PID:2428

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Winlogon Helper DLL

      1
      T1004

      Modify Existing Service

      2
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Discovery

      System Information Discovery

      2
      T1082

      Query Registry

      1
      T1012

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\100.EXE
        MD5

        489a50015452c6201699353cef028220

        SHA1

        9865b0fc144dab7bb949cb37702f3eb16b2446c9

        SHA256

        08b48f85ec3c8fe70872fb0863c072c0dc50f78406110a582c1b20161b486b81

        SHA512

        e1adadb18ac0b76559e78116124da8b3ed81bdc1f39f41fdf73d85989c222963ce2328da349fe6b290a68b07af42e9fc3495d770136ebaa7d87a12b9a1dafe65

      • C:\Users\Admin\AppData\Local\Temp\100.EXE
        MD5

        489a50015452c6201699353cef028220

        SHA1

        9865b0fc144dab7bb949cb37702f3eb16b2446c9

        SHA256

        08b48f85ec3c8fe70872fb0863c072c0dc50f78406110a582c1b20161b486b81

        SHA512

        e1adadb18ac0b76559e78116124da8b3ed81bdc1f39f41fdf73d85989c222963ce2328da349fe6b290a68b07af42e9fc3495d770136ebaa7d87a12b9a1dafe65

      • C:\Users\Admin\AppData\Local\Temp\200.EXE
        MD5

        4a01ee2707136d0cb5b3ed3254afeef5

        SHA1

        873ea51f801940f1299d3a3d40877655d45376dd

        SHA256

        128a1d5c2012008c835ca05a385647121dda7b5e9811297e9eeb2a270ebcea78

        SHA512

        5813162e0620001f353932a3c16bc45d728a62dde9530a1523ff58c2c6d04e88fc9363bffeb0f6ca6cda06d3fd161005588a1f804b03713c35d1a8b886937e0d

      • C:\Users\Admin\AppData\Local\Temp\200.EXE
        MD5

        4a01ee2707136d0cb5b3ed3254afeef5

        SHA1

        873ea51f801940f1299d3a3d40877655d45376dd

        SHA256

        128a1d5c2012008c835ca05a385647121dda7b5e9811297e9eeb2a270ebcea78

        SHA512

        5813162e0620001f353932a3c16bc45d728a62dde9530a1523ff58c2c6d04e88fc9363bffeb0f6ca6cda06d3fd161005588a1f804b03713c35d1a8b886937e0d

      • C:\Users\Admin\AppData\Local\Temp\NJRAT V0.7D.EXE
        MD5

        720e7ceaa5c49f653c2b2eed7f51ab36

        SHA1

        781f1142def97b626d1e2f50b8e300f76696557c

        SHA256

        d684b56fd5fcd4ce421548a6a3211e1d33722371b862ecfbcd76f78b68d955c5

        SHA512

        31251117aa992263dae9af5069448b78ac687bc4f29d4c34c06013a94d7359498a653548eccc5f7ddab2c543da2aad3f99490c7ac4f1baa9a57edaadd0a1f2bd

      • C:\Users\Admin\AppData\Local\Temp\NJRAT V0.7D.EXE
        MD5

        720e7ceaa5c49f653c2b2eed7f51ab36

        SHA1

        781f1142def97b626d1e2f50b8e300f76696557c

        SHA256

        d684b56fd5fcd4ce421548a6a3211e1d33722371b862ecfbcd76f78b68d955c5

        SHA512

        31251117aa992263dae9af5069448b78ac687bc4f29d4c34c06013a94d7359498a653548eccc5f7ddab2c543da2aad3f99490c7ac4f1baa9a57edaadd0a1f2bd

      • C:\Users\Admin\AppData\Local\Temp\windowscra.exe
        MD5

        5b5ac97705245c79b7dc5553ea9ef725

        SHA1

        8c43d1de280dc53dad5c95d765ef78b52a81c62d

        SHA256

        b243cf67bf384a80b8de34c6e8b351bb3f6cbe2c24ef4c7168489ce0bde00e1d

        SHA512

        8715ae2dac65df613e5ad5715b4240a947597918caa890e4b1610166f73b75736fb536330d14e6a5fa1395f80fb37ea35aa98bf328a6d1b71354aa789a93443c

      • C:\Users\Admin\AppData\Local\Temp\windowscra.exe
        MD5

        5b5ac97705245c79b7dc5553ea9ef725

        SHA1

        8c43d1de280dc53dad5c95d765ef78b52a81c62d

        SHA256

        b243cf67bf384a80b8de34c6e8b351bb3f6cbe2c24ef4c7168489ce0bde00e1d

        SHA512

        8715ae2dac65df613e5ad5715b4240a947597918caa890e4b1610166f73b75736fb536330d14e6a5fa1395f80fb37ea35aa98bf328a6d1b71354aa789a93443c

      • C:\Users\Admin\AppData\Local\Temp\winlogon.exe
        MD5

        4a01ee2707136d0cb5b3ed3254afeef5

        SHA1

        873ea51f801940f1299d3a3d40877655d45376dd

        SHA256

        128a1d5c2012008c835ca05a385647121dda7b5e9811297e9eeb2a270ebcea78

        SHA512

        5813162e0620001f353932a3c16bc45d728a62dde9530a1523ff58c2c6d04e88fc9363bffeb0f6ca6cda06d3fd161005588a1f804b03713c35d1a8b886937e0d

      • C:\Users\Admin\AppData\Local\Temp\winlogon.exe
        MD5

        4a01ee2707136d0cb5b3ed3254afeef5

        SHA1

        873ea51f801940f1299d3a3d40877655d45376dd

        SHA256

        128a1d5c2012008c835ca05a385647121dda7b5e9811297e9eeb2a270ebcea78

        SHA512

        5813162e0620001f353932a3c16bc45d728a62dde9530a1523ff58c2c6d04e88fc9363bffeb0f6ca6cda06d3fd161005588a1f804b03713c35d1a8b886937e0d

      • C:\Windows\SysWOW64\viprsm.exe
        MD5

        489a50015452c6201699353cef028220

        SHA1

        9865b0fc144dab7bb949cb37702f3eb16b2446c9

        SHA256

        08b48f85ec3c8fe70872fb0863c072c0dc50f78406110a582c1b20161b486b81

        SHA512

        e1adadb18ac0b76559e78116124da8b3ed81bdc1f39f41fdf73d85989c222963ce2328da349fe6b290a68b07af42e9fc3495d770136ebaa7d87a12b9a1dafe65

      • C:\Windows\SysWOW64\viprsm.exe
        MD5

        489a50015452c6201699353cef028220

        SHA1

        9865b0fc144dab7bb949cb37702f3eb16b2446c9

        SHA256

        08b48f85ec3c8fe70872fb0863c072c0dc50f78406110a582c1b20161b486b81

        SHA512

        e1adadb18ac0b76559e78116124da8b3ed81bdc1f39f41fdf73d85989c222963ce2328da349fe6b290a68b07af42e9fc3495d770136ebaa7d87a12b9a1dafe65

      • memory/196-128-0x0000000000000000-mapping.dmp
      • memory/196-136-0x0000000000750000-0x000000000089A000-memory.dmp
        Filesize

        1.3MB

      • memory/1272-135-0x0000000000000000-mapping.dmp
      • memory/1272-137-0x0000000002DD0000-0x0000000002DD1000-memory.dmp
        Filesize

        4KB

      • memory/2140-139-0x0000000000000000-mapping.dmp
      • memory/2140-142-0x00000000014F0000-0x00000000014F1000-memory.dmp
        Filesize

        4KB

      • memory/2140-115-0x0000000000000000-mapping.dmp
      • memory/2352-126-0x0000000000B00000-0x0000000000C4A000-memory.dmp
        Filesize

        1.3MB

      • memory/2352-118-0x0000000000000000-mapping.dmp
      • memory/2616-143-0x0000000000000000-mapping.dmp
      • memory/2660-122-0x0000000000000000-mapping.dmp
      • memory/2660-138-0x00000000029C7000-0x00000000029CF000-memory.dmp
        Filesize

        32KB

      • memory/2660-127-0x00000000029C0000-0x00000000029C2000-memory.dmp
        Filesize

        8KB

      • memory/3476-132-0x000000000048F888-mapping.dmp
      • memory/3476-131-0x0000000000400000-0x0000000000684000-memory.dmp
        Filesize

        2.5MB

      • memory/3876-114-0x0000000002530000-0x0000000002531000-memory.dmp
        Filesize

        4KB