Analysis

  • max time kernel
    70s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-09-2021 23:52

General

  • Target

    2EB88BA0EC82B9BE5DEF15BFD603EBFB764089EC2B14D.exe

  • Size

    40KB

  • MD5

    1e59602b94507836f0fddb82d8c7ac04

  • SHA1

    1374bfc9639ae6583e79eb3cbd120a890dc3cb6b

  • SHA256

    2eb88ba0ec82b9be5def15bfd603ebfb764089ec2b14d2272feedc7b34630a01

  • SHA512

    8e103f07aad5fc7fc6e1238ebccb450f21d822e3a1eddcf061dd60c9b26eb86023770050fe9ae83f8dd1d31172bcb6208f3742d3d33958dac01481356a2610ed

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2EB88BA0EC82B9BE5DEF15BFD603EBFB764089EC2B14D.exe
    "C:\Users\Admin\AppData\Local\Temp\2EB88BA0EC82B9BE5DEF15BFD603EBFB764089EC2B14D.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\ProgramData\ccleaner.exe
      "C:\ProgramData\ccleaner.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\SYSTEM32\netsh.exe
        netsh firewall add allowedprogram "C:\ProgramData\ccleaner.exe" "ccleaner.exe" ENABLE
        3⤵
          PID:1592
        • C:\Windows\SYSTEM32\netsh.exe
          netsh firewall delete allowedprogram "C:\ProgramData\ccleaner.exe"
          3⤵
            PID:748
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /c ping 0 -n 2 & del "C:\ProgramData\ccleaner.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:696
            • C:\Windows\system32\PING.EXE
              ping 0 -n 2
              4⤵
              • Runs ping.exe
              PID:3640

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\ccleaner.exe
        MD5

        1e59602b94507836f0fddb82d8c7ac04

        SHA1

        1374bfc9639ae6583e79eb3cbd120a890dc3cb6b

        SHA256

        2eb88ba0ec82b9be5def15bfd603ebfb764089ec2b14d2272feedc7b34630a01

        SHA512

        8e103f07aad5fc7fc6e1238ebccb450f21d822e3a1eddcf061dd60c9b26eb86023770050fe9ae83f8dd1d31172bcb6208f3742d3d33958dac01481356a2610ed

      • C:\ProgramData\ccleaner.exe
        MD5

        1e59602b94507836f0fddb82d8c7ac04

        SHA1

        1374bfc9639ae6583e79eb3cbd120a890dc3cb6b

        SHA256

        2eb88ba0ec82b9be5def15bfd603ebfb764089ec2b14d2272feedc7b34630a01

        SHA512

        8e103f07aad5fc7fc6e1238ebccb450f21d822e3a1eddcf061dd60c9b26eb86023770050fe9ae83f8dd1d31172bcb6208f3742d3d33958dac01481356a2610ed

      • memory/696-122-0x0000000000000000-mapping.dmp
      • memory/748-121-0x0000000000000000-mapping.dmp
      • memory/1592-119-0x0000000000000000-mapping.dmp
      • memory/3024-115-0x0000000000000000-mapping.dmp
      • memory/3024-118-0x0000000002C40000-0x0000000002C42000-memory.dmp
        Filesize

        8KB

      • memory/3024-120-0x0000000002C44000-0x0000000002C45000-memory.dmp
        Filesize

        4KB

      • memory/3640-123-0x0000000000000000-mapping.dmp
      • memory/3728-114-0x00000000005F0000-0x00000000005F2000-memory.dmp
        Filesize

        8KB