Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-05-2021 12:02
Static task
static1
Behavioral task
behavioral1
Sample
B7272AB1D83A3CAE498E513E0CFF087F.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
B7272AB1D83A3CAE498E513E0CFF087F.exe
Resource
win10v20210410
General
-
Target
B7272AB1D83A3CAE498E513E0CFF087F.exe
-
Size
56KB
-
MD5
b7272ab1d83a3cae498e513e0cff087f
-
SHA1
7729415361e73ac4730f2c53e33d65ad892efde7
-
SHA256
96e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
-
SHA512
0f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
Malware Config
Extracted
njrat
0.7d
MyBot
ratnk.duckdns.org:1605
b0cb8ce9e5434c245c6380f65c492e81
-
reg_key
b0cb8ce9e5434c245c6380f65c492e81
-
splitter
Y262SUCZ4UJJ
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
WindowsServices.exeWindowsServices.exepid process 2712 WindowsServices.exe 1484 WindowsServices.exe -
Modifies Windows Firewall 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
B7272AB1D83A3CAE498E513E0CFF087F.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce B7272AB1D83A3CAE498E513E0CFF087F.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CkAxNALyWL = "C:\\Users\\Admin\\AppData\\Roaming\\ZmFSAqsNCM\\yNDFQpcPWY.exe" B7272AB1D83A3CAE498E513E0CFF087F.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
B7272AB1D83A3CAE498E513E0CFF087F.exeWindowsServices.exedescription pid process target process PID 744 set thread context of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 2712 set thread context of 1484 2712 WindowsServices.exe WindowsServices.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
WindowsServices.exedescription pid process Token: SeDebugPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe Token: 33 1484 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServices.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
B7272AB1D83A3CAE498E513E0CFF087F.exeB7272AB1D83A3CAE498E513E0CFF087F.exeWindowsServices.exeWindowsServices.exedescription pid process target process PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 744 wrote to memory of 2352 744 B7272AB1D83A3CAE498E513E0CFF087F.exe B7272AB1D83A3CAE498E513E0CFF087F.exe PID 2352 wrote to memory of 2712 2352 B7272AB1D83A3CAE498E513E0CFF087F.exe WindowsServices.exe PID 2352 wrote to memory of 2712 2352 B7272AB1D83A3CAE498E513E0CFF087F.exe WindowsServices.exe PID 2352 wrote to memory of 2712 2352 B7272AB1D83A3CAE498E513E0CFF087F.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 2712 wrote to memory of 1484 2712 WindowsServices.exe WindowsServices.exe PID 1484 wrote to memory of 1340 1484 WindowsServices.exe netsh.exe PID 1484 wrote to memory of 1340 1484 WindowsServices.exe netsh.exe PID 1484 wrote to memory of 1340 1484 WindowsServices.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"C:\Users\Admin\AppData\Local\Temp\B7272AB1D83A3CAE498E513E0CFF087F.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\B7272AB1D83A3CAE498E513E0CFF087F.exe.logMD5
4cce90d514b02375cc96049f5979fa96
SHA1336fdb6c53577dbcac509d31bd515757817bff35
SHA256ab019bbc94253e3afc0fc09d3722a6eecab94857c734fbd75b3e558cc48427d0
SHA512530e3566fe42db495103a110dd50d665fef013f2ebd09db1b149f51825fd4406d4e5b8272fceb99581b47609940a2994a14893ca3712ae3cf4509c39b060d3d0
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WindowsServices.exe.logMD5
4cce90d514b02375cc96049f5979fa96
SHA1336fdb6c53577dbcac509d31bd515757817bff35
SHA256ab019bbc94253e3afc0fc09d3722a6eecab94857c734fbd75b3e558cc48427d0
SHA512530e3566fe42db495103a110dd50d665fef013f2ebd09db1b149f51825fd4406d4e5b8272fceb99581b47609940a2994a14893ca3712ae3cf4509c39b060d3d0
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exeMD5
b7272ab1d83a3cae498e513e0cff087f
SHA17729415361e73ac4730f2c53e33d65ad892efde7
SHA25696e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
SHA5120f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exeMD5
b7272ab1d83a3cae498e513e0cff087f
SHA17729415361e73ac4730f2c53e33d65ad892efde7
SHA25696e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
SHA5120f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
-
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exeMD5
b7272ab1d83a3cae498e513e0cff087f
SHA17729415361e73ac4730f2c53e33d65ad892efde7
SHA25696e438e2623b95267817cfa70cb9ebe627c4a051662b5af7162bc671ae32b8cf
SHA5120f00c0bcff463324a41e462f58d6673e1db634272f967b471d355aee62e0e02c959cbfed70bbc931d3bc03ee46f303f0b50a9d68570f582d566f4fa6c81eb417
-
memory/744-116-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/744-117-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/744-118-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/744-119-0x0000000005030000-0x0000000005033000-memory.dmpFilesize
12KB
-
memory/744-114-0x0000000000840000-0x0000000000841000-memory.dmpFilesize
4KB
-
memory/744-126-0x0000000005000000-0x0000000005092000-memory.dmpFilesize
584KB
-
memory/1340-146-0x0000000000000000-mapping.dmp
-
memory/1484-150-0x00000000052E0000-0x00000000052E1000-memory.dmpFilesize
4KB
-
memory/1484-138-0x000000000040952E-mapping.dmp
-
memory/1484-148-0x0000000004F00000-0x0000000004F01000-memory.dmpFilesize
4KB
-
memory/1484-149-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/1484-151-0x00000000060D0000-0x00000000060D1000-memory.dmpFilesize
4KB
-
memory/2352-120-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2352-121-0x000000000040952E-mapping.dmp
-
memory/2712-145-0x0000000002CC0000-0x0000000002D52000-memory.dmpFilesize
584KB
-
memory/2712-127-0x0000000000000000-mapping.dmp