Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-09-2021 09:10

General

  • Target

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe

  • Size

    732KB

  • MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

  • SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

  • SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

  • SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

marbeyli.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Extracted

Family

darkcomet

Botnet

Sazan

C2

marbeyli.ddns.net:443

Mutex

DC_MUTEX-WF3HSVR

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    CTg6jh11p8Xh

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 7 IoCs
  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe
    "C:\Users\Admin\AppData\Local\Temp\820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
      "C:\Users\Admin\AppData\Local\Temp\CHROME.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:3064
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9843.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4076
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:4004
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3664
    • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
      "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\SYSTEM32\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe
        3⤵
        • Creates scheduled task(s)
        PID:3776
    • C:\Users\Admin\Documents\MSDCSC\svchost.exe
      "C:\Users\Admin\Documents\MSDCSC\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
        "C:\Users\Admin\AppData\Local\Temp\CHROME.EXE"
        3⤵
        • Executes dropped EXE
        PID:2276
      • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
        "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
        3⤵
        • Executes dropped EXE
        PID:2356
  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    C:\Users\Admin\AppData\Local\Temp/Server.exe
    1⤵
    • Executes dropped EXE
    PID:2216
  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    C:\Users\Admin\AppData\Local\Temp/Server.exe
    1⤵
    • Executes dropped EXE
    PID:2008

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Server.exe.log
    MD5

    ada37846cea22757d6153e65b720a367

    SHA1

    d9c9e33987d095b32c364fe40dd6f054feaf7ea9

    SHA256

    7daa4e8a6296b9e3df9669f6a574cbe481f2df9c751affbeb41a541173264520

    SHA512

    592640e40ad0c6bcd8719f2cdbf828f2e322ad729c23ac3b44dd252a9c0b08d370a1cfcbcb9038cdffed0866ae4d2f8762c421f5e1a89c8d9273f482d9d2662f

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CHROME.EXE.log
    MD5

    605f809fab8c19729d39d075f7ffdb53

    SHA1

    c546f877c9bd53563174a90312a8337fdfc5fdd9

    SHA256

    6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

    SHA512

    82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\tmp9843.tmp.bat
    MD5

    9b0bc423dc4192f9bdfa805870fe9702

    SHA1

    5539689feccc05ce1b89ed90e982bbd4474bc871

    SHA256

    910c467ac4ea58bc887c288fd7b1aed23f99fa3d37d3dec915fba78ebcbec2b1

    SHA512

    eae4b744b747f1469e587f1e90d1371fdb401f9c353194ab494e0802c38d4d87bec62d0c1cb0687e21803a11553d5c7fb08bedd18047bad47c64db655747c34d

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • C:\Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • memory/912-114-0x0000000000570000-0x000000000061E000-memory.dmp
    Filesize

    696KB

  • memory/1320-141-0x0000000004A40000-0x0000000004A41000-memory.dmp
    Filesize

    4KB

  • memory/1320-144-0x0000000004C10000-0x0000000004C11000-memory.dmp
    Filesize

    4KB

  • memory/1320-125-0x0000000000570000-0x0000000000571000-memory.dmp
    Filesize

    4KB

  • memory/1320-115-0x0000000000000000-mapping.dmp
  • memory/1360-117-0x0000000000000000-mapping.dmp
  • memory/1360-123-0x0000000001210000-0x000000000121B000-memory.dmp
    Filesize

    44KB

  • memory/1360-124-0x000000001C402000-0x000000001C403000-memory.dmp
    Filesize

    4KB

  • memory/1360-120-0x0000000000D50000-0x0000000000D51000-memory.dmp
    Filesize

    4KB

  • memory/1860-139-0x00000000004D0000-0x000000000057E000-memory.dmp
    Filesize

    696KB

  • memory/1860-127-0x0000000000000000-mapping.dmp
  • memory/2008-169-0x000000001AFA0000-0x000000001AFA2000-memory.dmp
    Filesize

    8KB

  • memory/2216-163-0x000000001ABE0000-0x000000001ABE2000-memory.dmp
    Filesize

    8KB

  • memory/2228-145-0x0000000000000000-mapping.dmp
  • memory/2276-142-0x00000000047E0000-0x00000000047E1000-memory.dmp
    Filesize

    4KB

  • memory/2276-130-0x0000000000000000-mapping.dmp
  • memory/2356-132-0x0000000000000000-mapping.dmp
  • memory/2356-140-0x000000001BA02000-0x000000001BA03000-memory.dmp
    Filesize

    4KB

  • memory/3064-149-0x0000000000000000-mapping.dmp
  • memory/3664-156-0x0000000005401000-0x0000000005402000-memory.dmp
    Filesize

    4KB

  • memory/3664-151-0x0000000000000000-mapping.dmp
  • memory/3776-143-0x0000000000000000-mapping.dmp
  • memory/4004-150-0x0000000000000000-mapping.dmp
  • memory/4076-146-0x0000000000000000-mapping.dmp