Analysis
-
max time kernel
83s -
max time network
128s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
08-09-2021 21:12
Static task
static1
Behavioral task
behavioral1
Sample
aa652fc67ec4c4353b9a5562c9ec0d21.exe
Resource
win7-en
General
-
Target
aa652fc67ec4c4353b9a5562c9ec0d21.exe
-
Size
816KB
-
MD5
aa652fc67ec4c4353b9a5562c9ec0d21
-
SHA1
1dea45515e03d1f561e5a31a1859aea7aa05bd62
-
SHA256
ae4fdb69e4ef555cb516a8052d715d741ae565c97cc595f3ea0dc3cd349c4b8d
-
SHA512
eddb0fa378f4d4f9aa1ab0eee44705024e89d6bd2c09a313f60b2203f7cf52c2e66909154c4a176bf865da1c211ddcbe1d9b12224125e44eb6ee70e0c61e4e09
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
gbarpresencewriterprint.duckdns.org:8651
682708ec68e74
-
reg_key
682708ec68e74
-
splitter
@!#&^%$
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
aa652fc67ec4c4353b9a5562c9ec0d21.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa652fc67ec4c4353b9a5562c9ec0d21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa652fc67ec4c4353b9a5562c9ec0d21.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
aa652fc67ec4c4353b9a5562c9ec0d21.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum aa652fc67ec4c4353b9a5562c9ec0d21.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 aa652fc67ec4c4353b9a5562c9ec0d21.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
aa652fc67ec4c4353b9a5562c9ec0d21.exedescription pid process target process PID 568 set thread context of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exeaa652fc67ec4c4353b9a5562c9ec0d21.exepowershell.exepid process 2152 powershell.exe 1548 powershell.exe 1548 powershell.exe 2152 powershell.exe 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe 3724 powershell.exe 3724 powershell.exe 2152 powershell.exe 1548 powershell.exe 3724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exeaa652fc67ec4c4353b9a5562c9ec0d21.exepowershell.exedescription pid process Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe Token: SeDebugPrivilege 3724 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
aa652fc67ec4c4353b9a5562c9ec0d21.exedescription pid process target process PID 568 wrote to memory of 2152 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 2152 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 2152 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 1548 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 1548 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 1548 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 2352 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe schtasks.exe PID 568 wrote to memory of 2352 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe schtasks.exe PID 568 wrote to memory of 2352 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe schtasks.exe PID 568 wrote to memory of 3724 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 3724 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 3724 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe powershell.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe PID 568 wrote to memory of 3572 568 aa652fc67ec4c4353b9a5562c9ec0d21.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa652fc67ec4c4353b9a5562c9ec0d21.exe"C:\Users\Admin\AppData\Local\Temp\aa652fc67ec4c4353b9a5562c9ec0d21.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\aa652fc67ec4c4353b9a5562c9ec0d21.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BkueKqkOElUWV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BkueKqkOElUWV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9953.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BkueKqkOElUWV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9953.tmpMD5
fc4573ce606b063da594053f959323c9
SHA1ef223ce0ab757e70d820292dfa8a1a68d560a629
SHA2565c09e5b7dfe5f529dbcd41783166eee85c1641e79231bbf819d553e876f621d4
SHA512fc1ed013b391558dea773f59cc5b945e9f031a2bf80e5012e0fd382fcf79b56e8e7fe48f8203d4398115aa21f31a4754575bd6873fc00be84054197e6c97d17d
-
memory/568-123-0x00000000074C0000-0x00000000074C9000-memory.dmpFilesize
36KB
-
memory/568-116-0x0000000005570000-0x0000000005571000-memory.dmpFilesize
4KB
-
memory/568-118-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/568-119-0x0000000005070000-0x000000000556E000-memory.dmpFilesize
5.0MB
-
memory/568-114-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB
-
memory/568-121-0x00000000054B0000-0x00000000054C1000-memory.dmpFilesize
68KB
-
memory/568-117-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/568-122-0x0000000007430000-0x00000000074A8000-memory.dmpFilesize
480KB
-
memory/568-120-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/568-125-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/1548-248-0x0000000006CB3000-0x0000000006CB4000-memory.dmpFilesize
4KB
-
memory/1548-165-0x0000000006CB2000-0x0000000006CB3000-memory.dmpFilesize
4KB
-
memory/1548-130-0x0000000000000000-mapping.dmp
-
memory/1548-162-0x00000000082D0000-0x00000000082D1000-memory.dmpFilesize
4KB
-
memory/1548-209-0x000000007E5A0000-0x000000007E5A1000-memory.dmpFilesize
4KB
-
memory/1548-140-0x0000000006CB0000-0x0000000006CB1000-memory.dmpFilesize
4KB
-
memory/2152-137-0x0000000007132000-0x0000000007133000-memory.dmpFilesize
4KB
-
memory/2152-128-0x0000000007070000-0x0000000007071000-memory.dmpFilesize
4KB
-
memory/2152-133-0x0000000007E40000-0x0000000007E41000-memory.dmpFilesize
4KB
-
memory/2152-143-0x0000000008090000-0x0000000008091000-memory.dmpFilesize
4KB
-
memory/2152-124-0x0000000000000000-mapping.dmp
-
memory/2152-244-0x0000000007133000-0x0000000007134000-memory.dmpFilesize
4KB
-
memory/2152-135-0x0000000007130000-0x0000000007131000-memory.dmpFilesize
4KB
-
memory/2152-214-0x000000007E210000-0x000000007E211000-memory.dmpFilesize
4KB
-
memory/2152-159-0x0000000008400000-0x0000000008401000-memory.dmpFilesize
4KB
-
memory/2152-131-0x0000000007DA0000-0x0000000007DA1000-memory.dmpFilesize
4KB
-
memory/2152-197-0x00000000095B0000-0x00000000095E3000-memory.dmpFilesize
204KB
-
memory/2152-129-0x0000000007770000-0x0000000007771000-memory.dmpFilesize
4KB
-
memory/2152-170-0x0000000008880000-0x0000000008881000-memory.dmpFilesize
4KB
-
memory/2352-132-0x0000000000000000-mapping.dmp
-
memory/3572-150-0x00000000004067AE-mapping.dmp
-
memory/3572-149-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3572-251-0x0000000004D40000-0x000000000523E000-memory.dmpFilesize
5.0MB
-
memory/3724-169-0x00000000046B2000-0x00000000046B3000-memory.dmpFilesize
4KB
-
memory/3724-167-0x00000000046B0000-0x00000000046B1000-memory.dmpFilesize
4KB
-
memory/3724-218-0x000000007EFC0000-0x000000007EFC1000-memory.dmpFilesize
4KB
-
memory/3724-148-0x0000000000000000-mapping.dmp
-
memory/3724-250-0x00000000046B3000-0x00000000046B4000-memory.dmpFilesize
4KB