Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-09-2021 20:06
Static task
static1
Behavioral task
behavioral1
Sample
8bc16349fad1dd201cf7929eb7ae7fce.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
8bc16349fad1dd201cf7929eb7ae7fce.exe
Resource
win10v20210408
General
-
Target
8bc16349fad1dd201cf7929eb7ae7fce.exe
-
Size
1.1MB
-
MD5
8bc16349fad1dd201cf7929eb7ae7fce
-
SHA1
8a4eeb9c27e09c9e970f63731f9137013ad83c19
-
SHA256
c8ad2a5b3da748a73f4ba9497f5d7674735f93716b9454fea5db13c7d5d0ee68
-
SHA512
b7fba6f2c4694ff7c48c3b136c37a3f456e1bcf9a5aeb32fcd3eb9b51dcfe2f8ab1c2d0242a6ce0e1f7c75c9fa45d11c6a36ea46cc91e56fcabfa4e966f9f5c3
Malware Config
Extracted
njrat
v2.0
TAX_MON_30_08
37.120.141.158:18892
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Drops startup file 1 IoCs
Processes:
8bc16349fad1dd201cf7929eb7ae7fce.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 8bc16349fad1dd201cf7929eb7ae7fce.exe -
Processes:
8bc16349fad1dd201cf7929eb7ae7fce.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 8bc16349fad1dd201cf7929eb7ae7fce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Microsoft.NET\Framework\鄊鄶酂鄄鄟鄅鄵鄉鄷鄌酀鄅酊鄻鄊\svchost.exe = "0" 8bc16349fad1dd201cf7929eb7ae7fce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exe = "0" 8bc16349fad1dd201cf7929eb7ae7fce.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 8bc16349fad1dd201cf7929eb7ae7fce.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8bc16349fad1dd201cf7929eb7ae7fce.exedescription pid process target process PID 4648 set thread context of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe -
Drops file in Windows directory 2 IoCs
Processes:
8bc16349fad1dd201cf7929eb7ae7fce.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\鄊鄶酂鄄鄟鄅鄵鄉鄷鄌酀鄅酊鄻鄊\svchost.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe File opened for modification C:\Windows\Microsoft.NET\Framework\鄊鄶酂鄄鄟鄅鄵鄉鄷鄌酀鄅酊鄻鄊\svchost.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exepowershell.exepowershell.exe8bc16349fad1dd201cf7929eb7ae7fce.exepid process 4228 powershell.exe 496 powershell.exe 4272 powershell.exe 496 powershell.exe 4272 powershell.exe 4228 powershell.exe 4228 powershell.exe 4272 powershell.exe 496 powershell.exe 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
powershell.exepowershell.exepowershell.exe8bc16349fad1dd201cf7929eb7ae7fce.exe8bc16349fad1dd201cf7929eb7ae7fce.exedescription pid process Token: SeDebugPrivilege 4272 powershell.exe Token: SeDebugPrivilege 496 powershell.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeDebugPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: 33 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe Token: SeIncBasePriorityPrivilege 1276 8bc16349fad1dd201cf7929eb7ae7fce.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
8bc16349fad1dd201cf7929eb7ae7fce.exedescription pid process target process PID 4648 wrote to memory of 496 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 496 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 496 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 4228 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 4228 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 4228 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 4272 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 4272 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 4272 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe powershell.exe PID 4648 wrote to memory of 1204 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1204 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1204 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1204 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1204 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe PID 4648 wrote to memory of 1276 4648 8bc16349fad1dd201cf7929eb7ae7fce.exe 8bc16349fad1dd201cf7929eb7ae7fce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exe"C:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exe"1⤵
- Windows security modification
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\鄊鄶酂鄄鄟鄅鄵鄉鄷鄌酀鄅酊鄻鄊\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\鄊鄶酂鄄鄟鄅鄵鄉鄷鄌酀鄅酊鄻鄊\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exeC:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exeC:\Users\Admin\AppData\Local\Temp\8bc16349fad1dd201cf7929eb7ae7fce.exe2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
34cbce7a86066983ddec1c5c7316fa24
SHA1a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9
SHA25623bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42
SHA512f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
34cbce7a86066983ddec1c5c7316fa24
SHA1a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9
SHA25623bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42
SHA512f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
9fdd675ed7b89464cee1f5eb755f0e64
SHA192b74c7a83d1a003a416b2d89bd6f7bb900bd4e1
SHA2566e48ea2f962ef6e24c2d926bcf7102ec1483a8bb979d508bf68ccb431d70b169
SHA512ecc797f211f80e03f312340cd655caa55cd145b5996a0dc3a50e11fa49908c17843fff1471feb37f41d6ff08eebb6a553400ca196a2a9b9af3d4ddb52ff8dfd4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
16f52e9798e7af1aa0e0911b374410e8
SHA1a1c6becff281c60dbb7306f33bbbc98cdfbe8bd8
SHA25666911a77b7c88a18b54927796ef9acd319b37637bedc54761264db99412d978e
SHA512ec899d67b0c7d51a93e0825ebc058ee78fc545834e009795fcb0119930931335a924a8cf94ea18f9d2bf037f623b8a49fd1e60329e0dfcd1fef12638822820c3
-
memory/496-119-0x0000000000000000-mapping.dmp
-
memory/496-128-0x00000000048C0000-0x00000000048C1000-memory.dmpFilesize
4KB
-
memory/496-135-0x0000000006EB0000-0x0000000006EB1000-memory.dmpFilesize
4KB
-
memory/496-248-0x0000000006EB3000-0x0000000006EB4000-memory.dmpFilesize
4KB
-
memory/496-222-0x000000007E8E0000-0x000000007E8E1000-memory.dmpFilesize
4KB
-
memory/496-191-0x0000000009170000-0x00000000091A3000-memory.dmpFilesize
204KB
-
memory/496-140-0x0000000006EB2000-0x0000000006EB3000-memory.dmpFilesize
4KB
-
memory/496-164-0x0000000007B20000-0x0000000007B21000-memory.dmpFilesize
4KB
-
memory/1276-155-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1276-424-0x00000000060F0000-0x00000000060F1000-memory.dmpFilesize
4KB
-
memory/1276-156-0x000000000040838E-mapping.dmp
-
memory/4228-218-0x000000007EC50000-0x000000007EC51000-memory.dmpFilesize
4KB
-
memory/4228-132-0x0000000006D80000-0x0000000006D81000-memory.dmpFilesize
4KB
-
memory/4228-146-0x0000000006C70000-0x0000000006C71000-memory.dmpFilesize
4KB
-
memory/4228-252-0x0000000006743000-0x0000000006744000-memory.dmpFilesize
4KB
-
memory/4228-152-0x0000000007600000-0x0000000007601000-memory.dmpFilesize
4KB
-
memory/4228-136-0x0000000006740000-0x0000000006741000-memory.dmpFilesize
4KB
-
memory/4228-138-0x0000000006742000-0x0000000006743000-memory.dmpFilesize
4KB
-
memory/4228-161-0x0000000006D60000-0x0000000006D61000-memory.dmpFilesize
4KB
-
memory/4228-120-0x0000000000000000-mapping.dmp
-
memory/4272-167-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/4272-139-0x0000000006EB2000-0x0000000006EB3000-memory.dmpFilesize
4KB
-
memory/4272-212-0x0000000009220000-0x0000000009221000-memory.dmpFilesize
4KB
-
memory/4272-215-0x000000007E9B0000-0x000000007E9B1000-memory.dmpFilesize
4KB
-
memory/4272-121-0x0000000000000000-mapping.dmp
-
memory/4272-137-0x0000000006EB0000-0x0000000006EB1000-memory.dmpFilesize
4KB
-
memory/4272-142-0x00000000073F0000-0x00000000073F1000-memory.dmpFilesize
4KB
-
memory/4272-149-0x0000000007B90000-0x0000000007B91000-memory.dmpFilesize
4KB
-
memory/4272-255-0x0000000006EB3000-0x0000000006EB4000-memory.dmpFilesize
4KB
-
memory/4648-114-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/4648-131-0x0000000005FA0000-0x0000000005FA1000-memory.dmpFilesize
4KB
-
memory/4648-145-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/4648-141-0x0000000004DA0000-0x000000000529E000-memory.dmpFilesize
5.0MB
-
memory/4648-118-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/4648-117-0x0000000004BA0000-0x0000000004BFF000-memory.dmpFilesize
380KB
-
memory/4648-116-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB