Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-09-2021 02:02

General

  • Target

    3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe

  • Size

    37KB

  • MD5

    7b6b31441c3a261f2ec5268bf9e265da

  • SHA1

    44512e2339d0f6f0c5fdd09d39048e62e0337bc1

  • SHA256

    3f24adf406a6b813670c31d2f77a4fab0c9f47e76697491807114d055c26b3d5

  • SHA512

    d6c5fd06f7d2f079ad764c85d2fe7451b142f67743a4299ca17551eca03061262c0281853659b36a8bd52928230ace2e542f9211a14eaf8c86ba7b29d08afba2

Malware Config

Signatures

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
    "C:\Users\Admin\AppData\Local\Temp\3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe" "3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe" ENABLE
      2⤵
        PID:748

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/748-115-0x0000000000000000-mapping.dmp
    • memory/3728-114-0x0000000002730000-0x0000000002731000-memory.dmp
      Filesize

      4KB