Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en -
submitted
16-09-2021 17:41
Static task
static1
Behavioral task
behavioral1
Sample
DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe
Resource
win10v20210408
General
-
Target
DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe
-
Size
91KB
-
MD5
6b5bc3eba86c9efbdf993773af3f593e
-
SHA1
0fd0f10d34c28a928e69343caeeed7803646be8f
-
SHA256
dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
-
SHA512
cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
Malware Config
Extracted
njrat
0.7 MultiHost
HacKed
anunankis1.duckdns.org,anunankis3.duckdns.org,karmina112.sytes.net,karmina114.sytes.net,burdun.dynu.net,burdun114.dynu.net:1177
8746d62c81bb0c573a0a1086f9955c7b
-
reg_key
8746d62c81bb0c573a0a1086f9955c7b
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 6 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exepid process 1352 svchost.exe 1488 svchost.exe 1088 svchost.exe 1944 svchost.exe 1956 svchost.exe 1744 svchost.exe -
Drops startup file 3 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8746d62c81bb0c573a0a1086f9955c7b.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8746d62c81bb0c573a0a1086f9955c7b.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CCleaner.lnk svchost.exe -
Loads dropped DLL 5 IoCs
Processes:
DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exesvchost.exesvchost.exesvchost.exesvchost.exepid process 1076 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe 1352 svchost.exe 1488 svchost.exe 1088 svchost.exe 1956 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\8746d62c81bb0c573a0a1086f9955c7b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8746d62c81bb0c573a0a1086f9955c7b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exesvchost.exesvchost.exesvchost.exedescription pid process target process PID 1032 set thread context of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1352 set thread context of 1488 1352 svchost.exe svchost.exe PID 1088 set thread context of 1944 1088 svchost.exe svchost.exe PID 1956 set thread context of 1744 1956 svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe Token: 33 1488 svchost.exe Token: SeIncBasePriorityPrivilege 1488 svchost.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exeDBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exesvchost.exesvchost.exetaskeng.exesvchost.exesvchost.exedescription pid process target process PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1032 wrote to memory of 1076 1032 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe PID 1076 wrote to memory of 1352 1076 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe svchost.exe PID 1076 wrote to memory of 1352 1076 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe svchost.exe PID 1076 wrote to memory of 1352 1076 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe svchost.exe PID 1076 wrote to memory of 1352 1076 DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1352 wrote to memory of 1488 1352 svchost.exe svchost.exe PID 1488 wrote to memory of 1888 1488 svchost.exe schtasks.exe PID 1488 wrote to memory of 1888 1488 svchost.exe schtasks.exe PID 1488 wrote to memory of 1888 1488 svchost.exe schtasks.exe PID 1488 wrote to memory of 1888 1488 svchost.exe schtasks.exe PID 1684 wrote to memory of 1088 1684 taskeng.exe svchost.exe PID 1684 wrote to memory of 1088 1684 taskeng.exe svchost.exe PID 1684 wrote to memory of 1088 1684 taskeng.exe svchost.exe PID 1684 wrote to memory of 1088 1684 taskeng.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1088 wrote to memory of 1944 1088 svchost.exe svchost.exe PID 1684 wrote to memory of 1956 1684 taskeng.exe svchost.exe PID 1684 wrote to memory of 1956 1684 taskeng.exe svchost.exe PID 1684 wrote to memory of 1956 1684 taskeng.exe svchost.exe PID 1684 wrote to memory of 1956 1684 taskeng.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 1744 1956 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe"C:\Users\Admin\AppData\Local\Temp\DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe"C:\Users\Admin\AppData\Local\Temp\DBD5E126CAD149E95614507E63A255F2B26B9A4E539B7.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {0F427F52-EC38-450C-9150-6CC453135888} S-1-5-21-1669990088-476967504-438132596-1000:KJUCCLUP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6b5bc3eba86c9efbdf993773af3f593e
SHA10fd0f10d34c28a928e69343caeeed7803646be8f
SHA256dbd5e126cad149e95614507e63a255f2b26b9a4e539b7bcd25e7d8a1e2bd6e07
SHA512cd5c91dc4de88b46384a6c615f6a0da3250a00a34c11221c8dcf9d857fde0ce8cff0a55f8442e2b7a1758d2f7b77b69d7265cc96427f972295124c06095cc3d1
-
memory/1032-54-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/1032-53-0x0000000075B51000-0x0000000075B53000-memory.dmpFilesize
8KB
-
memory/1076-58-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB
-
memory/1076-56-0x0000000000407AEE-mapping.dmp
-
memory/1076-55-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1088-73-0x0000000000000000-mapping.dmp
-
memory/1088-85-0x0000000001EC0000-0x0000000001EC1000-memory.dmpFilesize
4KB
-
memory/1352-69-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/1352-60-0x0000000000000000-mapping.dmp
-
memory/1488-70-0x0000000001F50000-0x0000000001F51000-memory.dmpFilesize
4KB
-
memory/1488-66-0x0000000000407AEE-mapping.dmp
-
memory/1744-100-0x0000000001E80000-0x0000000001E81000-memory.dmpFilesize
4KB
-
memory/1744-92-0x0000000000407AEE-mapping.dmp
-
memory/1888-71-0x0000000000000000-mapping.dmp
-
memory/1944-80-0x0000000000080000-0x000000000008C000-memory.dmpFilesize
48KB
-
memory/1944-86-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/1944-83-0x0000000000080000-0x000000000008C000-memory.dmpFilesize
48KB
-
memory/1944-78-0x0000000000407AEE-mapping.dmp
-
memory/1956-87-0x0000000000000000-mapping.dmp
-
memory/1956-99-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB