Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    13-08-2021 23:29

General

  • Target

    2AD561E9BB9F780F56D5E7A280574432.exe

  • Size

    375KB

  • MD5

    2ad561e9bb9f780f56d5e7a280574432

  • SHA1

    e6bc833d62ef0ec1e08674a0a8707e3ce2f09007

  • SHA256

    54f33fa555874b30e6045c4bfd467779b0683e1bcafb69d0987c59019203c9d3

  • SHA512

    8b74c1f6df444ce101102e3b036e2f77c9e0b1ebb085db2de8e45905ab10b47c845040548901632c130c4db6b4403a5905d864c461cb9bed6cd5fe49fc0ce064

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

212.192.241.42:5552

Mutex

34adf4afddd35097c6bf7951c5baad3a

Attributes
  • reg_key

    34adf4afddd35097c6bf7951c5baad3a

  • splitter

    |'|'|

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exe
    "C:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2252
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3860
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ikjuwwswk.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\putty.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3140
    • C:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exe
      C:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:736
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3964
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ikjuwwswk.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3984
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\putty.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3976
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          C:\Users\Admin\AppData\Local\Temp\server.exe
          4⤵
          • Executes dropped EXE
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:908
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            5⤵
              PID:2160

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/652-114-0x00000000003D0000-0x00000000003D1000-memory.dmp

      Filesize

      4KB

    • memory/652-119-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

      Filesize

      4KB

    • memory/652-116-0x00000000051E0000-0x00000000051E1000-memory.dmp

      Filesize

      4KB

    • memory/652-312-0x0000000006930000-0x0000000006976000-memory.dmp

      Filesize

      280KB

    • memory/652-313-0x0000000006980000-0x00000000069F5000-memory.dmp

      Filesize

      468KB

    • memory/652-117-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

      Filesize

      4KB

    • memory/652-118-0x0000000004CE0000-0x00000000051DE000-memory.dmp

      Filesize

      5.0MB

    • memory/736-546-0x0000000007313000-0x0000000007314000-memory.dmp

      Filesize

      4KB

    • memory/736-462-0x0000000007310000-0x0000000007311000-memory.dmp

      Filesize

      4KB

    • memory/736-464-0x0000000007312000-0x0000000007313000-memory.dmp

      Filesize

      4KB

    • memory/908-1042-0x0000000004F40000-0x0000000004FDC000-memory.dmp

      Filesize

      624KB

    • memory/2252-139-0x0000000008BB0000-0x0000000008BB1000-memory.dmp

      Filesize

      4KB

    • memory/2252-149-0x0000000006A93000-0x0000000006A94000-memory.dmp

      Filesize

      4KB

    • memory/2252-123-0x00000000043D0000-0x00000000043D1000-memory.dmp

      Filesize

      4KB

    • memory/2252-124-0x00000000070D0000-0x00000000070D1000-memory.dmp

      Filesize

      4KB

    • memory/2252-125-0x0000000006A90000-0x0000000006A91000-memory.dmp

      Filesize

      4KB

    • memory/2252-126-0x0000000006A92000-0x0000000006A93000-memory.dmp

      Filesize

      4KB

    • memory/2252-127-0x0000000006E30000-0x0000000006E31000-memory.dmp

      Filesize

      4KB

    • memory/2252-128-0x0000000006ED0000-0x0000000006ED1000-memory.dmp

      Filesize

      4KB

    • memory/2252-129-0x0000000007020000-0x0000000007021000-memory.dmp

      Filesize

      4KB

    • memory/2252-130-0x0000000007800000-0x0000000007801000-memory.dmp

      Filesize

      4KB

    • memory/2252-131-0x0000000006A70000-0x0000000006A71000-memory.dmp

      Filesize

      4KB

    • memory/2252-132-0x0000000008150000-0x0000000008151000-memory.dmp

      Filesize

      4KB

    • memory/2252-133-0x0000000007EE0000-0x0000000007EE1000-memory.dmp

      Filesize

      4KB

    • memory/2252-138-0x0000000008E40000-0x0000000008E41000-memory.dmp

      Filesize

      4KB

    • memory/2252-140-0x0000000008C00000-0x0000000008C01000-memory.dmp

      Filesize

      4KB

    • memory/2252-148-0x0000000009F60000-0x0000000009F61000-memory.dmp

      Filesize

      4KB

    • memory/2952-440-0x0000000002F90000-0x0000000002F91000-memory.dmp

      Filesize

      4KB

    • memory/3140-329-0x0000000007390000-0x0000000007391000-memory.dmp

      Filesize

      4KB

    • memory/3140-396-0x0000000007393000-0x0000000007394000-memory.dmp

      Filesize

      4KB

    • memory/3140-357-0x0000000009BB0000-0x0000000009BB1000-memory.dmp

      Filesize

      4KB

    • memory/3140-352-0x0000000009980000-0x0000000009981000-memory.dmp

      Filesize

      4KB

    • memory/3140-345-0x00000000099C0000-0x00000000099F3000-memory.dmp

      Filesize

      204KB

    • memory/3140-336-0x0000000008C40000-0x0000000008C41000-memory.dmp

      Filesize

      4KB

    • memory/3140-358-0x000000007F2F0000-0x000000007F2F1000-memory.dmp

      Filesize

      4KB

    • memory/3140-333-0x00000000081F0000-0x00000000081F1000-memory.dmp

      Filesize

      4KB

    • memory/3140-331-0x0000000007392000-0x0000000007393000-memory.dmp

      Filesize

      4KB

    • memory/3684-316-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/3684-321-0x0000000005260000-0x0000000005261000-memory.dmp

      Filesize

      4KB

    • memory/3860-192-0x0000000007462000-0x0000000007463000-memory.dmp

      Filesize

      4KB

    • memory/3860-224-0x0000000007463000-0x0000000007464000-memory.dmp

      Filesize

      4KB

    • memory/3860-190-0x0000000007460000-0x0000000007461000-memory.dmp

      Filesize

      4KB

    • memory/3964-689-0x0000000000C50000-0x0000000000C51000-memory.dmp

      Filesize

      4KB

    • memory/3964-726-0x0000000000C53000-0x0000000000C54000-memory.dmp

      Filesize

      4KB

    • memory/3964-690-0x0000000000C52000-0x0000000000C53000-memory.dmp

      Filesize

      4KB

    • memory/3976-892-0x00000000075C3000-0x00000000075C4000-memory.dmp

      Filesize

      4KB

    • memory/3976-802-0x00000000075C0000-0x00000000075C1000-memory.dmp

      Filesize

      4KB

    • memory/3976-803-0x00000000075C2000-0x00000000075C3000-memory.dmp

      Filesize

      4KB

    • memory/3976-891-0x000000007EFB0000-0x000000007EFB1000-memory.dmp

      Filesize

      4KB