Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-08-2021 19:37
Static task
static1
Behavioral task
behavioral1
Sample
753C707E47BCE65D32BE781EA1584E0B.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
753C707E47BCE65D32BE781EA1584E0B.exe
Resource
win10v20210410
General
-
Target
753C707E47BCE65D32BE781EA1584E0B.exe
-
Size
84KB
-
MD5
753c707e47bce65d32be781ea1584e0b
-
SHA1
7b43f6a910b01553dfae51560570365e3ce9ed42
-
SHA256
b1c0e35f47273a236518f43ee56c0367d8b423ca9ed8f9e7ad4a875caa47bb69
-
SHA512
8afc2ebbc80e17e42317202e9479e0c223456cf9f0b22ccdf9fe486eff19ebf9a33a2e00c01aa81168d4ad9950c34c8d78dc2f5821702fe61874221088d3cdda
Malware Config
Extracted
njrat
0.7d
NYAN CAT
narotomagic.publicvm.com:6663
a728eeadc9774101a351e2a5b3fe9598
-
reg_key
a728eeadc9774101a351e2a5b3fe9598
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 2 IoCs
pid Process 4116 primt.exe 2452 primt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\primt.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\primt.exe\"" 753C707E47BCE65D32BE781EA1584E0B.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4444 set thread context of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4116 set thread context of 2452 4116 primt.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 4444 753C707E47BCE65D32BE781EA1584E0B.exe Token: SeDebugPrivilege 4116 primt.exe Token: SeDebugPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe Token: 33 2452 primt.exe Token: SeIncBasePriorityPrivilege 2452 primt.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4444 wrote to memory of 4916 4444 753C707E47BCE65D32BE781EA1584E0B.exe 75 PID 4916 wrote to memory of 4116 4916 753C707E47BCE65D32BE781EA1584E0B.exe 80 PID 4916 wrote to memory of 4116 4916 753C707E47BCE65D32BE781EA1584E0B.exe 80 PID 4916 wrote to memory of 4116 4916 753C707E47BCE65D32BE781EA1584E0B.exe 80 PID 4116 wrote to memory of 2452 4116 primt.exe 81 PID 4116 wrote to memory of 2452 4116 primt.exe 81 PID 4116 wrote to memory of 2452 4116 primt.exe 81 PID 4116 wrote to memory of 2452 4116 primt.exe 81 PID 4116 wrote to memory of 2452 4116 primt.exe 81 PID 4116 wrote to memory of 2452 4116 primt.exe 81 PID 4116 wrote to memory of 2452 4116 primt.exe 81 PID 4116 wrote to memory of 2452 4116 primt.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exe"C:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exeC:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\primt.exe"C:\Users\Admin\AppData\Roaming\primt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Roaming\primt.exeC:\Users\Admin\AppData\Roaming\primt.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-