Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en -
submitted
16-09-2021 00:36
Static task
static1
Behavioral task
behavioral1
Sample
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe
-
Size
91KB
-
MD5
8e0342b0a50e046c2b22f6d9548024eb
-
SHA1
0378936325dd0a19ac2547ad462017db60d9d315
-
SHA256
04e1a14639f9fd0903f21edd99b1cadc9267b0ac2f402863d6eb3acc4d48acf7
-
SHA512
cc9a2a0bcfbfd686b7be8487cc95eec046b30a46878cea40a457082478b5b6f00965b54d81cf4a3b7659fd087a27e0f0ad1c6f47cbbab7ff82f5b5bc3fb95876
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
kanichnadia.duckdns.org:1979
Mutex
c9b81cdf127358c4e9ff59acf837f3c6
Attributes
-
reg_key
c9b81cdf127358c4e9ff59acf837f3c6
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exedescription pid process Token: SeDebugPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: 33 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe Token: SeIncBasePriorityPrivilege 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exedescription pid process target process PID 4000 wrote to memory of 3164 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe netsh.exe PID 4000 wrote to memory of 3164 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe netsh.exe PID 4000 wrote to memory of 3164 4000 04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe"C:\Users\Admin\AppData\Local\Temp\04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe" "04E1A14639F9FD0903F21EDD99B1CADC9267B0AC2F402.exe" ENABLE2⤵PID:3164
-