Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    21-09-2021 09:10

General

  • Target

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe

  • Size

    732KB

  • MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

  • SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

  • SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

  • SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

marbeyli.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Extracted

Family

darkcomet

Botnet

Sazan

C2

marbeyli.ddns.net:443

Mutex

DC_MUTEX-WF3HSVR

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    CTg6jh11p8Xh

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 12 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe
    "C:\Users\Admin\AppData\Local\Temp\820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
      "C:\Users\Admin\AppData\Local\Temp\CHROME.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1628
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1376
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpDD53.tmp.bat""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1796
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1744
    • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
      "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe
        3⤵
        • Creates scheduled task(s)
        PID:1448
    • C:\Users\Admin\Documents\MSDCSC\svchost.exe
      "C:\Users\Admin\Documents\MSDCSC\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
        "C:\Users\Admin\AppData\Local\Temp\CHROME.EXE"
        3⤵
        • Executes dropped EXE
        PID:756
      • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
        "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
        3⤵
        • Executes dropped EXE
        PID:1444
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0D67EDBE-1E86-4E91-83C1-1280453CED64} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      C:\Users\Admin\AppData\Local\Temp/Server.exe
      2⤵
      • Executes dropped EXE
      PID:520
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      C:\Users\Admin\AppData\Local\Temp/Server.exe
      2⤵
      • Executes dropped EXE
      PID:1612

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\tmpDD53.tmp.bat
    MD5

    460c580be96d049a0d042adbd84b3ef9

    SHA1

    08a50fb66978be64ee529124bea8009401bc8512

    SHA256

    3c8a6f4690e151c9aead2c1965f269e92fb517a750b69ba2197d94f38e55ffce

    SHA512

    ed1b1def6ee034b407559a8cc9481bfe5ed2e9334f0cd2dec1d79b026276ab4cd54361fbf8601d0c23d4addbee1189d6c384caaf4cb07bcf559c613b056c151e

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • C:\Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • \Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • \Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • \Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • \Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • \Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • \Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • memory/520-109-0x0000000001270000-0x0000000001271000-memory.dmp
    Filesize

    4KB

  • memory/520-106-0x0000000000000000-mapping.dmp
  • memory/520-112-0x000000001B1C0000-0x000000001B1C2000-memory.dmp
    Filesize

    8KB

  • memory/756-75-0x0000000000000000-mapping.dmp
  • memory/756-91-0x0000000000670000-0x0000000000671000-memory.dmp
    Filesize

    4KB

  • memory/1080-54-0x00000000003C0000-0x00000000003C1000-memory.dmp
    Filesize

    4KB

  • memory/1080-53-0x0000000075FC1000-0x0000000075FC3000-memory.dmp
    Filesize

    8KB

  • memory/1084-90-0x0000000004570000-0x0000000004571000-memory.dmp
    Filesize

    4KB

  • memory/1084-56-0x0000000000000000-mapping.dmp
  • memory/1084-63-0x0000000000CC0000-0x0000000000CC1000-memory.dmp
    Filesize

    4KB

  • memory/1376-94-0x0000000000000000-mapping.dmp
  • memory/1444-79-0x0000000000000000-mapping.dmp
  • memory/1444-87-0x000000001A810000-0x000000001A812000-memory.dmp
    Filesize

    8KB

  • memory/1448-97-0x0000000000000000-mapping.dmp
  • memory/1536-93-0x0000000000000000-mapping.dmp
  • memory/1612-113-0x0000000000000000-mapping.dmp
  • memory/1612-118-0x000000001B410000-0x000000001B412000-memory.dmp
    Filesize

    8KB

  • memory/1628-92-0x0000000000000000-mapping.dmp
  • memory/1688-67-0x0000000000240000-0x000000000024B000-memory.dmp
    Filesize

    44KB

  • memory/1688-81-0x0000000000530000-0x0000000000532000-memory.dmp
    Filesize

    8KB

  • memory/1688-65-0x0000000000DC0000-0x0000000000DC1000-memory.dmp
    Filesize

    4KB

  • memory/1688-59-0x0000000000000000-mapping.dmp
  • memory/1744-105-0x0000000004D50000-0x0000000004D51000-memory.dmp
    Filesize

    4KB

  • memory/1744-102-0x0000000000C40000-0x0000000000C41000-memory.dmp
    Filesize

    4KB

  • memory/1744-100-0x0000000000000000-mapping.dmp
  • memory/1796-96-0x0000000000000000-mapping.dmp
  • memory/1880-83-0x0000000000250000-0x0000000000251000-memory.dmp
    Filesize

    4KB

  • memory/1880-70-0x0000000000000000-mapping.dmp