Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-05-2021 11:26
Static task
static1
Behavioral task
behavioral1
Sample
B7272AB1D83A3CAE498E513E0CFF087F.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
B7272AB1D83A3CAE498E513E0CFF087F.exe
Resource
win10v20210410
General
-
Target
B7272AB1D83A3CAE498E513E0CFF087F.exe
-
Size
56KB
-
MD5
b7272ab1d83a3cae498e513e0cff087f
-
SHA1
7729415361e73ac4730f2c53e33d65ad892efde7
-
SHA256
96e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
-
SHA512
0f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
Malware Config
Extracted
njrat
0.7d
MyBot
ratnk.duckdns.org:1605
b0cb8ce9e5434c245c6380f65c492e81
-
reg_key
b0cb8ce9e5434c245c6380f65c492e81
-
splitter
Y262SUCZ4UJJ
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
WindowsServices.exeWindowsServices.exepid process 3816 WindowsServices.exe 3392 WindowsServices.exe -
Modifies Windows Firewall 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
B7272AB1D83A3CAE498E513E0CFF087F.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CkAxNALyWL = "C:\\Users\\Admin\\AppData\\Roaming\\ZmFSAqsNCM\\yNDFQpcPWY.exe" B7272AB1D83A3CAE498E513E0CFF087F.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce B7272AB1D83A3CAE498E513E0CFF087F.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
B7272AB1D83A3CAE498E513E0CFF087F.exeWindowsServices.exedescription pid process target process PID 3016 set thread context of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3816 set thread context of 3392 3816 WindowsServices.exe WindowsServices.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
WindowsServices.exedescription pid process Token: SeDebugPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe Token: 33 3392 WindowsServices.exe Token: SeIncBasePriorityPrivilege 3392 WindowsServices.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
B7272AB1D83A3CAE498E513E0CFF087F.exeB7272AB1D83A3CAE498E513E0CFF087F.exeWindowsServices.exeWindowsServices.exedescription pid process target process PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 3016 wrote to memory of 2736 3016 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 2736 wrote to memory of 3816 2736 B7272AB1D83A3CAE498E513E0CFF087F.exe WindowsServices.exe PID 2736 wrote to memory of 3816 2736 B7272AB1D83A3CAE498E513E0CFF087F.exe WindowsServices.exe PID 2736 wrote to memory of 3816 2736 B7272AB1D83A3CAE498E513E0CFF087F.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3816 wrote to memory of 3392 3816 WindowsServices.exe WindowsServices.exe PID 3392 wrote to memory of 2088 3392 WindowsServices.exe netsh.exe PID 3392 wrote to memory of 2088 3392 WindowsServices.exe netsh.exe PID 3392 wrote to memory of 2088 3392 WindowsServices.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\B7272AB1D83A3CAE498E513E0CFF087F.exe.logMD5
4cce90d514b02375cc96049f5979fa96
SHA1336fdb6c53577dbcac509d31bd515757817bff35
SHA256ab019bbc94253e3afc0fc09d3722a6eecab94857c734fbd75b3e558cc48427d0
SHA512530e3566fe42db495103a110dd50d665fef013f2ebd09db1b149f51825fd4406d4e5b8272fceb99581b47609940a2994a14893ca3712ae3cf4509c39b060d3d0
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WindowsServices.exe.logMD5
4cce90d514b02375cc96049f5979fa96
SHA1336fdb6c53577dbcac509d31bd515757817bff35
SHA256ab019bbc94253e3afc0fc09d3722a6eecab94857c734fbd75b3e558cc48427d0
SHA512530e3566fe42db495103a110dd50d665fef013f2ebd09db1b149f51825fd4406d4e5b8272fceb99581b47609940a2994a14893ca3712ae3cf4509c39b060d3d0
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exeMD5
b7272ab1d83a3cae498e513e0cff087f
SHA17729415361e73ac4730f2c53e33d65ad892efde7
SHA25696e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
SHA5120f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exeMD5
b7272ab1d83a3cae498e513e0cff087f
SHA17729415361e73ac4730f2c53e33d65ad892efde7
SHA25696e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
SHA5120f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exeMD5
b7272ab1d83a3cae498e513e0cff087f
SHA17729415361e73ac4730f2c53e33d65ad892efde7
SHA25696e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
SHA5120f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
-
memory/2088-146-0x0000000000000000-mapping.dmp
-
memory/2736-120-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2736-121-0x000000000040952E-mapping.dmp
-
memory/3016-118-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/3016-114-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB
-
memory/3016-119-0x0000000004C30000-0x0000000004C33000-memory.dmpFilesize
12KB
-
memory/3016-127-0x0000000004B80000-0x000000000507E000-memory.dmpFilesize
5.0MB
-
memory/3016-117-0x0000000004C90000-0x0000000004C91000-memory.dmpFilesize
4KB
-
memory/3016-116-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/3392-138-0x000000000040952E-mapping.dmp
-
memory/3392-148-0x0000000005810000-0x0000000005D0E000-memory.dmpFilesize
5.0MB
-
memory/3392-149-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/3392-150-0x0000000005A20000-0x0000000005A21000-memory.dmpFilesize
4KB
-
memory/3392-151-0x0000000006750000-0x0000000006751000-memory.dmpFilesize
4KB
-
memory/3816-128-0x0000000000000000-mapping.dmp
-
memory/3816-145-0x00000000051D0000-0x00000000056CE000-memory.dmpFilesize
5.0MB