Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    11-09-2021 17:04

General

  • Target

    DE3D6958F101E3B252F18168F240480D.exe

  • Size

    819KB

  • MD5

    de3d6958f101e3b252f18168f240480d

  • SHA1

    4a2ff6b9018df0b31db61ce4f5a6d844c05dc3ce

  • SHA256

    1e73294675f42df94d101ece8c550fcfa2746ae6f8bf3261e16d315c5d8de832

  • SHA512

    ca26091630e7509e79b386cbc1024446d51bc1ff0763b14aa1e8d03b0ec815d2484beccc905d1694db87a5b1dc8a8e95971c25dd5cd51abe9cbd000aea13f1f7

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

alice2019.myftp.biz:5552

Mutex

28ac71370f2e4

Attributes
  • reg_key

    28ac71370f2e4

  • splitter

    @!#&^%$

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DE3D6958F101E3B252F18168F240480D.exe
    "C:\Users\Admin\AppData\Local\Temp\DE3D6958F101E3B252F18168F240480D.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\52830064\xwobhs.pif
      "C:\52830064\xwobhs.pif" aqkwbthvr.ikb
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:516

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\52830064\aqkwbthvr.ikb
    MD5

    1f4c7f94e81f5676cac726fa32a4267b

    SHA1

    916104ff346ab10620f0926c241cf248d4b25b90

    SHA256

    cc535eaa9283d61eda11015e006ae054ccd331a70ad96baeccad61f22efa624b

    SHA512

    006f7ae411969c304b492e733cfcee22de4aca0d07873a95cbb0195f3d322697acd20e3c4c53e67f2db8388ed6b089b634e5bbdd3406619b0ec40ad77ca93841

  • C:\52830064\brvhbiro.bin
    MD5

    34dc4be1960b4ac6aaff64726d0af2ec

    SHA1

    1fdf27bacfb1b6134c4c08773374485855ece15b

    SHA256

    2f2ac6f0e36134f2166e0232b64637dc7f2e33812d38e577f8c944b3f87edcda

    SHA512

    2d441101e828a9766be8df35ae923c0a16fa2b690b40bef6f0a27a22b2061bf53571aa09e35fc93af3e2e2df214f14dac7e73b14e86c59b9dfd1e0cb642e5eff

  • C:\52830064\xwobhs.pif
    MD5

    957fcff5374f7a5ee128d32c976adaa5

    SHA1

    72a4cc77337d22b5c23335538c62bea7ed9cbb93

    SHA256

    699534a988a6aa7c8c5ff4eb01ac28292be257b0312e6d7351fb4cacaa4124d5

    SHA512

    e9dc65fbb964cb64cfcbb1c9b5c53595b0f0304a7179710ddac5aefa2f0f40bb67271b7aeb39654254c2fe68fcd62b77a94674b8e9c3a57ad3497197ede87ca9

  • C:\52830064\xwobhs.pif
    MD5

    957fcff5374f7a5ee128d32c976adaa5

    SHA1

    72a4cc77337d22b5c23335538c62bea7ed9cbb93

    SHA256

    699534a988a6aa7c8c5ff4eb01ac28292be257b0312e6d7351fb4cacaa4124d5

    SHA512

    e9dc65fbb964cb64cfcbb1c9b5c53595b0f0304a7179710ddac5aefa2f0f40bb67271b7aeb39654254c2fe68fcd62b77a94674b8e9c3a57ad3497197ede87ca9

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
    MD5

    0e06054beb13192588e745ee63a84173

    SHA1

    30b7d4d1277bafd04a83779fd566a1f834a8d113

    SHA256

    c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

    SHA512

    251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
    MD5

    0e06054beb13192588e745ee63a84173

    SHA1

    30b7d4d1277bafd04a83779fd566a1f834a8d113

    SHA256

    c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

    SHA512

    251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

  • memory/516-120-0x0000000000D00000-0x0000000001240000-memory.dmp
    Filesize

    5.2MB

  • memory/516-121-0x0000000000D0676E-mapping.dmp
  • memory/516-126-0x00000000058A0000-0x00000000058A1000-memory.dmp
    Filesize

    4KB

  • memory/516-127-0x0000000005E40000-0x0000000005E41000-memory.dmp
    Filesize

    4KB

  • memory/516-128-0x0000000005B10000-0x0000000005B11000-memory.dmp
    Filesize

    4KB

  • memory/516-129-0x0000000005940000-0x0000000005E3E000-memory.dmp
    Filesize

    5.0MB

  • memory/516-130-0x0000000005AE0000-0x0000000005AE1000-memory.dmp
    Filesize

    4KB

  • memory/516-131-0x0000000005C20000-0x0000000005C21000-memory.dmp
    Filesize

    4KB

  • memory/3696-115-0x0000000000000000-mapping.dmp