Analysis
-
max time kernel
294s -
max time network
297s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-09-2021 11:31
Static task
static1
Behavioral task
behavioral1
Sample
avellaneda.bin.exe
Resource
win7-en
windows7_x64
0 signatures
0 seconds
General
-
Target
avellaneda.bin.exe
-
Size
420KB
-
MD5
0bb825d7755c400a76fd8512f6baab38
-
SHA1
278d3e2ca71d1b8f1e3b521e8885ae13e25d84da
-
SHA256
2543435084f6e995500f8e9f12312db2da5241029f78418a5308524e295443d9
-
SHA512
60bd692b834dd5280c93894adcfacde0d11cd0b7ae893a6b5a64cba704a13a0845f65bd322384d19e9eebf6a673a0565308f88769cc99eec4292c0ff2b980e34
Malware Config
Extracted
Family
njrat
Version
0.7NC
Botnet
NYAN CAT
C2
reald27.duckdns.org:3525
Mutex
f45dd4eb26
Attributes
-
reg_key
f45dd4eb26
-
splitter
@!#&^%$
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
avellaneda.bin.exedescription pid process target process PID 904 set thread context of 3836 904 avellaneda.bin.exe avellaneda.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 3136 powershell.exe 3136 powershell.exe 3136 powershell.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
powershell.exeavellaneda.bin.exedescription pid process Token: SeDebugPrivilege 3136 powershell.exe Token: SeDebugPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe Token: 33 3836 avellaneda.bin.exe Token: SeIncBasePriorityPrivilege 3836 avellaneda.bin.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
avellaneda.bin.exedescription pid process target process PID 904 wrote to memory of 3136 904 avellaneda.bin.exe powershell.exe PID 904 wrote to memory of 3136 904 avellaneda.bin.exe powershell.exe PID 904 wrote to memory of 3136 904 avellaneda.bin.exe powershell.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe PID 904 wrote to memory of 3836 904 avellaneda.bin.exe avellaneda.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\avellaneda.bin.exe"C:\Users\Admin\AppData\Local\Temp\avellaneda.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\avellaneda.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\avellaneda.bin.exe"C:\Users\Admin\AppData\Local\Temp\avellaneda.bin.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/904-114-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/904-116-0x0000000005390000-0x0000000005391000-memory.dmpFilesize
4KB
-
memory/904-117-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/904-118-0x0000000004D60000-0x0000000004DF2000-memory.dmpFilesize
584KB
-
memory/904-119-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/904-120-0x0000000005320000-0x0000000005327000-memory.dmpFilesize
28KB
-
memory/904-121-0x0000000008300000-0x0000000008301000-memory.dmpFilesize
4KB
-
memory/904-122-0x00000000084A0000-0x00000000084F7000-memory.dmpFilesize
348KB
-
memory/904-123-0x000000000AC00000-0x000000000AC22000-memory.dmpFilesize
136KB
-
memory/3136-137-0x0000000006A10000-0x0000000006A11000-memory.dmpFilesize
4KB
-
memory/3136-141-0x00000000073D0000-0x00000000073D1000-memory.dmpFilesize
4KB
-
memory/3136-368-0x0000000006840000-0x0000000006841000-memory.dmpFilesize
4KB
-
memory/3136-133-0x0000000004190000-0x0000000004191000-memory.dmpFilesize
4KB
-
memory/3136-134-0x0000000006D40000-0x0000000006D41000-memory.dmpFilesize
4KB
-
memory/3136-136-0x0000000006702000-0x0000000006703000-memory.dmpFilesize
4KB
-
memory/3136-135-0x0000000006700000-0x0000000006701000-memory.dmpFilesize
4KB
-
memory/3136-124-0x0000000000000000-mapping.dmp
-
memory/3136-138-0x0000000006B80000-0x0000000006B81000-memory.dmpFilesize
4KB
-
memory/3136-139-0x00000000074C0000-0x00000000074C1000-memory.dmpFilesize
4KB
-
memory/3136-140-0x0000000007630000-0x0000000007631000-memory.dmpFilesize
4KB
-
memory/3136-362-0x0000000006850000-0x0000000006851000-memory.dmpFilesize
4KB
-
memory/3136-142-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/3136-143-0x0000000007D10000-0x0000000007D11000-memory.dmpFilesize
4KB
-
memory/3136-151-0x0000000008C80000-0x0000000008CB3000-memory.dmpFilesize
204KB
-
memory/3136-158-0x0000000008C60000-0x0000000008C61000-memory.dmpFilesize
4KB
-
memory/3136-163-0x0000000008DB0000-0x0000000008DB1000-memory.dmpFilesize
4KB
-
memory/3136-165-0x0000000006703000-0x0000000006704000-memory.dmpFilesize
4KB
-
memory/3136-164-0x000000007E2D0000-0x000000007E2D1000-memory.dmpFilesize
4KB
-
memory/3136-166-0x0000000008F70000-0x0000000008F71000-memory.dmpFilesize
4KB
-
memory/3836-236-0x0000000005280000-0x000000000577E000-memory.dmpFilesize
5.0MB
-
memory/3836-125-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3836-126-0x000000000040676E-mapping.dmp