Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    08-09-2021 17:26

General

  • Target

    2f27554c5fbeb881bfe32ea5475befb4.exe

  • Size

    5KB

  • MD5

    2f27554c5fbeb881bfe32ea5475befb4

  • SHA1

    48eceac335a3129cbf2bc50b9026ba3a7d4b58de

  • SHA256

    62adcba42e924882bbbc57aa1a7801e7000ba3366e055beeab5d935d9f7822fc

  • SHA512

    5bed056bd6dd68c45837418b461b2e88bbf70466400c55b7228275cd9552a6b8cdd446b3f469d8844a6ff9c796b9fc054b27819a77f067bba27f502038248e99

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

grennoj.duckdns.org:8000

Mutex

f171208f74a9

Attributes
  • reg_key

    f171208f74a9

  • splitter

    @!#&^%$

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Downloads MZ/PE file
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f27554c5fbeb881bfe32ea5475befb4.exe
    "C:\Users\Admin\AppData\Local\Temp\2f27554c5fbeb881bfe32ea5475befb4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3964

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3964-121-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/3964-122-0x000000000040676E-mapping.dmp
  • memory/3964-131-0x0000000009960000-0x0000000009961000-memory.dmp
    Filesize

    4KB

  • memory/3964-134-0x00000000097F0000-0x0000000009CEE000-memory.dmp
    Filesize

    5.0MB

  • memory/3964-135-0x0000000009A20000-0x0000000009A21000-memory.dmp
    Filesize

    4KB

  • memory/3964-136-0x0000000009AA0000-0x0000000009AA1000-memory.dmp
    Filesize

    4KB

  • memory/4008-115-0x0000000000200000-0x0000000000201000-memory.dmp
    Filesize

    4KB

  • memory/4008-117-0x0000000004970000-0x0000000004971000-memory.dmp
    Filesize

    4KB

  • memory/4008-118-0x0000000005490000-0x00000000054EF000-memory.dmp
    Filesize

    380KB

  • memory/4008-119-0x00000000059F0000-0x00000000059F1000-memory.dmp
    Filesize

    4KB

  • memory/4008-120-0x0000000005790000-0x0000000005791000-memory.dmp
    Filesize

    4KB

  • memory/4008-125-0x00000000054F0000-0x00000000059EE000-memory.dmp
    Filesize

    5.0MB