Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-08-2021 23:29
Static task
static1
Behavioral task
behavioral1
Sample
2AD561E9BB9F780F56D5E7A280574432.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
2AD561E9BB9F780F56D5E7A280574432.exe
-
Size
375KB
-
MD5
2ad561e9bb9f780f56d5e7a280574432
-
SHA1
e6bc833d62ef0ec1e08674a0a8707e3ce2f09007
-
SHA256
54f33fa555874b30e6045c4bfd467779b0683e1bcafb69d0987c59019203c9d3
-
SHA512
8b74c1f6df444ce101102e3b036e2f77c9e0b1ebb085db2de8e45905ab10b47c845040548901632c130c4db6b4403a5905d864c461cb9bed6cd5fe49fc0ce064
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
212.192.241.42:5552
Mutex
34adf4afddd35097c6bf7951c5baad3a
Attributes
-
reg_key
34adf4afddd35097c6bf7951c5baad3a
-
splitter
|'|'|
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\putty.exe\"," 2AD561E9BB9F780F56D5E7A280574432.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\putty.exe\"," server.exe -
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 2 IoCs
pid Process 2952 server.exe 908 server.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34adf4afddd35097c6bf7951c5baad3a.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34adf4afddd35097c6bf7951c5baad3a.exe server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\34adf4afddd35097c6bf7951c5baad3a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\34adf4afddd35097c6bf7951c5baad3a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 652 set thread context of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 2952 set thread context of 908 2952 server.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 2AD561E9BB9F780F56D5E7A280574432.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings server.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 3860 powershell.exe 3860 powershell.exe 3860 powershell.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 652 2AD561E9BB9F780F56D5E7A280574432.exe 3140 powershell.exe 3140 powershell.exe 3140 powershell.exe 736 powershell.exe 736 powershell.exe 736 powershell.exe 3964 powershell.exe 3964 powershell.exe 3964 powershell.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 2952 server.exe 3976 powershell.exe 3976 powershell.exe 3976 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2252 powershell.exe Token: SeIncreaseQuotaPrivilege 2252 powershell.exe Token: SeSecurityPrivilege 2252 powershell.exe Token: SeTakeOwnershipPrivilege 2252 powershell.exe Token: SeLoadDriverPrivilege 2252 powershell.exe Token: SeSystemProfilePrivilege 2252 powershell.exe Token: SeSystemtimePrivilege 2252 powershell.exe Token: SeProfSingleProcessPrivilege 2252 powershell.exe Token: SeIncBasePriorityPrivilege 2252 powershell.exe Token: SeCreatePagefilePrivilege 2252 powershell.exe Token: SeBackupPrivilege 2252 powershell.exe Token: SeRestorePrivilege 2252 powershell.exe Token: SeShutdownPrivilege 2252 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeSystemEnvironmentPrivilege 2252 powershell.exe Token: SeRemoteShutdownPrivilege 2252 powershell.exe Token: SeUndockPrivilege 2252 powershell.exe Token: SeManageVolumePrivilege 2252 powershell.exe Token: 33 2252 powershell.exe Token: 34 2252 powershell.exe Token: 35 2252 powershell.exe Token: 36 2252 powershell.exe Token: SeIncreaseQuotaPrivilege 2252 powershell.exe Token: SeSecurityPrivilege 2252 powershell.exe Token: SeTakeOwnershipPrivilege 2252 powershell.exe Token: SeLoadDriverPrivilege 2252 powershell.exe Token: SeSystemProfilePrivilege 2252 powershell.exe Token: SeSystemtimePrivilege 2252 powershell.exe Token: SeProfSingleProcessPrivilege 2252 powershell.exe Token: SeIncBasePriorityPrivilege 2252 powershell.exe Token: SeCreatePagefilePrivilege 2252 powershell.exe Token: SeBackupPrivilege 2252 powershell.exe Token: SeRestorePrivilege 2252 powershell.exe Token: SeShutdownPrivilege 2252 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeSystemEnvironmentPrivilege 2252 powershell.exe Token: SeRemoteShutdownPrivilege 2252 powershell.exe Token: SeUndockPrivilege 2252 powershell.exe Token: SeManageVolumePrivilege 2252 powershell.exe Token: 33 2252 powershell.exe Token: 34 2252 powershell.exe Token: 35 2252 powershell.exe Token: 36 2252 powershell.exe Token: SeDebugPrivilege 3860 powershell.exe Token: SeIncreaseQuotaPrivilege 3860 powershell.exe Token: SeSecurityPrivilege 3860 powershell.exe Token: SeTakeOwnershipPrivilege 3860 powershell.exe Token: SeLoadDriverPrivilege 3860 powershell.exe Token: SeSystemProfilePrivilege 3860 powershell.exe Token: SeSystemtimePrivilege 3860 powershell.exe Token: SeProfSingleProcessPrivilege 3860 powershell.exe Token: SeIncBasePriorityPrivilege 3860 powershell.exe Token: SeCreatePagefilePrivilege 3860 powershell.exe Token: SeBackupPrivilege 3860 powershell.exe Token: SeRestorePrivilege 3860 powershell.exe Token: SeShutdownPrivilege 3860 powershell.exe Token: SeDebugPrivilege 3860 powershell.exe Token: SeSystemEnvironmentPrivilege 3860 powershell.exe Token: SeRemoteShutdownPrivilege 3860 powershell.exe Token: SeUndockPrivilege 3860 powershell.exe Token: SeManageVolumePrivilege 3860 powershell.exe Token: 33 3860 powershell.exe Token: 34 3860 powershell.exe Token: 35 3860 powershell.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 652 wrote to memory of 2252 652 2AD561E9BB9F780F56D5E7A280574432.exe 75 PID 652 wrote to memory of 2252 652 2AD561E9BB9F780F56D5E7A280574432.exe 75 PID 652 wrote to memory of 2252 652 2AD561E9BB9F780F56D5E7A280574432.exe 75 PID 652 wrote to memory of 3860 652 2AD561E9BB9F780F56D5E7A280574432.exe 77 PID 652 wrote to memory of 3860 652 2AD561E9BB9F780F56D5E7A280574432.exe 77 PID 652 wrote to memory of 3860 652 2AD561E9BB9F780F56D5E7A280574432.exe 77 PID 652 wrote to memory of 3740 652 2AD561E9BB9F780F56D5E7A280574432.exe 82 PID 652 wrote to memory of 3740 652 2AD561E9BB9F780F56D5E7A280574432.exe 82 PID 652 wrote to memory of 3740 652 2AD561E9BB9F780F56D5E7A280574432.exe 82 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 652 wrote to memory of 3684 652 2AD561E9BB9F780F56D5E7A280574432.exe 83 PID 3740 wrote to memory of 3140 3740 WScript.exe 84 PID 3740 wrote to memory of 3140 3740 WScript.exe 84 PID 3740 wrote to memory of 3140 3740 WScript.exe 84 PID 3684 wrote to memory of 2952 3684 2AD561E9BB9F780F56D5E7A280574432.exe 86 PID 3684 wrote to memory of 2952 3684 2AD561E9BB9F780F56D5E7A280574432.exe 86 PID 3684 wrote to memory of 2952 3684 2AD561E9BB9F780F56D5E7A280574432.exe 86 PID 2952 wrote to memory of 736 2952 server.exe 87 PID 2952 wrote to memory of 736 2952 server.exe 87 PID 2952 wrote to memory of 736 2952 server.exe 87 PID 2952 wrote to memory of 3964 2952 server.exe 89 PID 2952 wrote to memory of 3964 2952 server.exe 89 PID 2952 wrote to memory of 3964 2952 server.exe 89 PID 2952 wrote to memory of 3984 2952 server.exe 91 PID 2952 wrote to memory of 3984 2952 server.exe 91 PID 2952 wrote to memory of 3984 2952 server.exe 91 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 2952 wrote to memory of 908 2952 server.exe 92 PID 3984 wrote to memory of 3976 3984 WScript.exe 93 PID 3984 wrote to memory of 3976 3984 WScript.exe 93 PID 3984 wrote to memory of 3976 3984 WScript.exe 93 PID 908 wrote to memory of 2160 908 server.exe 95 PID 908 wrote to memory of 2160 908 server.exe 95 PID 908 wrote to memory of 2160 908 server.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exe"C:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ikjuwwswk.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\putty.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
-
C:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exeC:\Users\Admin\AppData\Local\Temp\2AD561E9BB9F780F56D5E7A280574432.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ikjuwwswk.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\putty.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
-
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵PID:2160
-
-
-
-