Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en -
submitted
16-09-2021 13:56
Static task
static1
Behavioral task
behavioral1
Sample
6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe
Resource
win10-en
General
-
Target
6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe
-
Size
82KB
-
MD5
42f06a2dd04a0b84c019557cc07f0cb6
-
SHA1
9f8b00c0cefd6e80ed813ac25b55b57e1289c724
-
SHA256
6c8f0805290d03ab8fe1d2e21eaf62b80ab8677c430272f23dea52de6e4d8998
-
SHA512
15228012f88fb714d868aec24574c532bb49a7f56ebdd8a97922d0a569a37c6f112cdb1224db37df50196c9cc08c07e90a1f72c26978adaaeec12212ef9a9556
Malware Config
Extracted
njrat
0.7 MultiHost
000000
karmina112.sytes.net,karmina115.sytes.net,burdun.dynu.net,burdun115.dynu.net,anunankis3.duckdns.org:1177
670b14728ad9902aecba32e22fa4f6bd
-
reg_key
670b14728ad9902aecba32e22fa4f6bd
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 3916 svchost.exe 3572 svchost.exe -
Drops startup file 3 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\670b14728ad9902aecba32e22fa4f6bd.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\670b14728ad9902aecba32e22fa4f6bd.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CCleaner.lnk svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\670b14728ad9902aecba32e22fa4f6bd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\670b14728ad9902aecba32e22fa4f6bd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exesvchost.exedescription pid process target process PID 3980 set thread context of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3916 set thread context of 3572 3916 svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe Token: 33 3572 svchost.exe Token: SeIncBasePriorityPrivilege 3572 svchost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exesvchost.exedescription pid process target process PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3980 wrote to memory of 3988 3980 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe PID 3988 wrote to memory of 3916 3988 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe svchost.exe PID 3988 wrote to memory of 3916 3988 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe svchost.exe PID 3988 wrote to memory of 3916 3988 6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe PID 3916 wrote to memory of 3572 3916 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe"C:\Users\Admin\AppData\Local\Temp\6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe"C:\Users\Admin\AppData\Local\Temp\6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\6C8F0805290D03AB8FE1D2E21EAF62B80AB8677C43027.exe.logMD5
c748e8ca8696cef7e06115966216593a
SHA1de51083153bc4e802050a6f3f8e2d273ea36e564
SHA256b83056f659f6c279f69432c96fcf4d90adde41c8a3798d3105e26fe8b864759d
SHA512d29689f58a3c672c5c2bc1a13d9b7ce7cf147f95364f54265f40783817b66e112e81e72a4e215e745a66d3ebfe57985c38d98b484646bfb01a7e92e805660ca2
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.logMD5
c748e8ca8696cef7e06115966216593a
SHA1de51083153bc4e802050a6f3f8e2d273ea36e564
SHA256b83056f659f6c279f69432c96fcf4d90adde41c8a3798d3105e26fe8b864759d
SHA512d29689f58a3c672c5c2bc1a13d9b7ce7cf147f95364f54265f40783817b66e112e81e72a4e215e745a66d3ebfe57985c38d98b484646bfb01a7e92e805660ca2
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
42f06a2dd04a0b84c019557cc07f0cb6
SHA19f8b00c0cefd6e80ed813ac25b55b57e1289c724
SHA2566c8f0805290d03ab8fe1d2e21eaf62b80ab8677c430272f23dea52de6e4d8998
SHA51215228012f88fb714d868aec24574c532bb49a7f56ebdd8a97922d0a569a37c6f112cdb1224db37df50196c9cc08c07e90a1f72c26978adaaeec12212ef9a9556
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
42f06a2dd04a0b84c019557cc07f0cb6
SHA19f8b00c0cefd6e80ed813ac25b55b57e1289c724
SHA2566c8f0805290d03ab8fe1d2e21eaf62b80ab8677c430272f23dea52de6e4d8998
SHA51215228012f88fb714d868aec24574c532bb49a7f56ebdd8a97922d0a569a37c6f112cdb1224db37df50196c9cc08c07e90a1f72c26978adaaeec12212ef9a9556
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
42f06a2dd04a0b84c019557cc07f0cb6
SHA19f8b00c0cefd6e80ed813ac25b55b57e1289c724
SHA2566c8f0805290d03ab8fe1d2e21eaf62b80ab8677c430272f23dea52de6e4d8998
SHA51215228012f88fb714d868aec24574c532bb49a7f56ebdd8a97922d0a569a37c6f112cdb1224db37df50196c9cc08c07e90a1f72c26978adaaeec12212ef9a9556
-
memory/3572-124-0x0000000000407ACE-mapping.dmp
-
memory/3572-128-0x0000000003501000-0x0000000003502000-memory.dmpFilesize
4KB
-
memory/3916-120-0x0000000000000000-mapping.dmp
-
memory/3916-127-0x0000000002801000-0x0000000002802000-memory.dmpFilesize
4KB
-
memory/3980-115-0x0000000002C70000-0x0000000002C71000-memory.dmpFilesize
4KB
-
memory/3988-117-0x0000000000407ACE-mapping.dmp
-
memory/3988-119-0x0000000000E70000-0x0000000000F1E000-memory.dmpFilesize
696KB
-
memory/3988-116-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB