Analysis
-
max time kernel
150s -
max time network
165s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-08-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
37A8EE92838E77CF667250CEDD0CECF8.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
37A8EE92838E77CF667250CEDD0CECF8.exe
Resource
win10v20210410
General
-
Target
37A8EE92838E77CF667250CEDD0CECF8.exe
-
Size
501KB
-
MD5
37a8ee92838e77cf667250cedd0cecf8
-
SHA1
1c63553822af742ee07fb27865c51b54b74f1a27
-
SHA256
a1912487964fbfa6a9004a0889bde004a7b3d007e98706b79688bbb6229af557
-
SHA512
d943bcfccfa3710a6c311dfb4f13325a1fb39f77392897928e196b07d4c2209aa44e959d9b265530a7c0adfdf87db9950997d729b9811c541c2ff531f69e115c
Malware Config
Extracted
njrat
0.7d
HacKed
imfares.ddns.net:9090
doza122.con-ip.com:5552
21010c58298d9aa69d2fa375e98ef354
-
reg_key
21010c58298d9aa69d2fa375e98ef354
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2388 Server.exe 2008 ss.exe 3200 windowsdefender.exe 3960 midia.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\84398377c5556d3df54a82be74cfa960.exe midia.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\84398377c5556d3df54a82be74cfa960.exe midia.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\21010c58298d9aa69d2fa375e98ef354 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ss.exe\" .." ss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\21010c58298d9aa69d2fa375e98ef354 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ss.exe\" .." ss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\84398377c5556d3df54a82be74cfa960 = "\"C:\\Users\\Admin\\AppData\\Roaming\\midia.exe\" .." midia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\84398377c5556d3df54a82be74cfa960 = "\"C:\\Users\\Admin\\AppData\\Roaming\\midia.exe\" .." midia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2008 ss.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: SeDebugPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe Token: 33 2008 ss.exe Token: SeIncBasePriorityPrivilege 2008 ss.exe Token: 33 3960 midia.exe Token: SeIncBasePriorityPrivilege 3960 midia.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2388 3944 37A8EE92838E77CF667250CEDD0CECF8.exe 75 PID 3944 wrote to memory of 2388 3944 37A8EE92838E77CF667250CEDD0CECF8.exe 75 PID 3944 wrote to memory of 2388 3944 37A8EE92838E77CF667250CEDD0CECF8.exe 75 PID 2388 wrote to memory of 2008 2388 Server.exe 79 PID 2388 wrote to memory of 2008 2388 Server.exe 79 PID 2388 wrote to memory of 2008 2388 Server.exe 79 PID 3944 wrote to memory of 3200 3944 37A8EE92838E77CF667250CEDD0CECF8.exe 81 PID 3944 wrote to memory of 3200 3944 37A8EE92838E77CF667250CEDD0CECF8.exe 81 PID 2008 wrote to memory of 2136 2008 ss.exe 82 PID 2008 wrote to memory of 2136 2008 ss.exe 82 PID 2008 wrote to memory of 2136 2008 ss.exe 82 PID 3200 wrote to memory of 3960 3200 windowsdefender.exe 84 PID 3200 wrote to memory of 3960 3200 windowsdefender.exe 84 PID 3960 wrote to memory of 1100 3960 midia.exe 85 PID 3960 wrote to memory of 1100 3960 midia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\37A8EE92838E77CF667250CEDD0CECF8.exe"C:\Users\Admin\AppData\Local\Temp\37A8EE92838E77CF667250CEDD0CECF8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\ss.exe"C:\Users\Admin\AppData\Local\Temp\ss.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\ss.exe" "ss.exe" ENABLE4⤵PID:2136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\windowsdefender.exe"C:\Users\Admin\AppData\Local\Temp\windowsdefender.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Roaming\midia.exe"C:\Users\Admin\AppData\Roaming\midia.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\midia.exe" "midia.exe" ENABLE4⤵PID:1100
-
-
-