Analysis

  • max time kernel
    149s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    21-09-2021 08:37

General

  • Target

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe

  • Size

    732KB

  • MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

  • SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

  • SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

  • SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

marbeyli.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Extracted

Family

darkcomet

Botnet

Sazan

C2

marbeyli.ddns.net:443

Mutex

DC_MUTEX-WF3HSVR

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    CTg6jh11p8Xh

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 12 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe
    "C:\Users\Admin\AppData\Local\Temp\820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
      "C:\Users\Admin\AppData\Local\Temp\CHROME.EXE"
      2⤵
      • Executes dropped EXE
      PID:1464
    • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
      "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe
        3⤵
        • Creates scheduled task(s)
        PID:1824
    • C:\Users\Admin\Documents\MSDCSC\svchost.exe
      "C:\Users\Admin\Documents\MSDCSC\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
        "C:\Users\Admin\AppData\Local\Temp\CHROME.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1920
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:784
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA91A.tmp.bat""
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            5⤵
            • Delays execution with timeout.exe
            PID:1500
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1532
      • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
        "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
        3⤵
        • Executes dropped EXE
        PID:884
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {517EA9BA-FEE4-4367-9B77-F158FD61FED3} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      C:\Users\Admin\AppData\Local\Temp/Server.exe
      2⤵
      • Executes dropped EXE
      PID:1628
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      C:\Users\Admin\AppData\Local\Temp/Server.exe
      2⤵
      • Executes dropped EXE
      PID:1660

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • C:\Users\Admin\AppData\Local\Temp\tmpA91A.tmp.bat
    MD5

    0b3cf874f79a880e126de5e5d1dd3504

    SHA1

    216c3ec8e34a1e8839593d5d803b924b1419496d

    SHA256

    ceeec3316dc1443321b1125688ba68acb26fcd0b3dbe048ca97e1f40ae78ef18

    SHA512

    a7515649997c26425e5505c484821101fa4fdf8a964a049927d7f7b7802ad5ab2d4b6067e403092b6a6207b304c10f0be72af71b0645d4331487e72889f42e04

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • C:\Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • C:\Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • \Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • \Users\Admin\AppData\Local\Temp\CHROME.EXE
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • \Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • \Users\Admin\AppData\Local\Temp\SVCHOST.EXE
    MD5

    869007a489b3a503d2d7c2bdadb63b8b

    SHA1

    781612f639b3a070bf5be90d701b9cd4c0e45733

    SHA256

    45ac13a13bc961103f78c3c2d0b03aa9883147c003100cb1ac102f353dd8c3ba

    SHA512

    674d4d262ec7f454d0e3390e3ea7cf6fdd4bbc2d4df6e27bcdbe6aa5601a52d9cbee1da42f99c425435a333b72d4d92dd353ef1dc3ab5a7c6690ed0efd9d98ae

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    aac877ad70ee726e75616b4153d88526

    SHA1

    7386c1a573b7a5fba3a671f10dcc27962743fd34

    SHA256

    7373d95ee79c58916f291fb6dd7ba69bf9b987a3c40c9090850b14279c045ebb

    SHA512

    62fa4d1e3d5e3d087f0ed0b9a1b0df01a5bf5ad13f2494435e43643fe54f9160a51e726e1072868dae5f3011f028c9700701a439324a56cd8d9a1593a4b695dd

  • \Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • \Users\Admin\Documents\MSDCSC\svchost.exe
    MD5

    a1c0d1485d1f2ac0d660ea28502e79ae

    SHA1

    fcd8a01e7c022c086747a680bb8995f9279aaa8c

    SHA256

    820f2381fe1860a8b6f9e66032ac4bb79ac6b7b9269264c547e4c63151593df0

    SHA512

    d44e3ecaefe8012aeaf5b3b4adf0d4aa6e2b9cf4565960def0c665d6294f7b21fa006a8d99b4e847b2a2f8eb0e9981bc4ce2f2f377541e53d84295b94108ad1f

  • memory/552-65-0x0000000000000000-mapping.dmp
  • memory/552-68-0x0000000001230000-0x0000000001231000-memory.dmp
    Filesize

    4KB

  • memory/552-71-0x00000000003C0000-0x00000000003CB000-memory.dmp
    Filesize

    44KB

  • memory/552-72-0x000000001B210000-0x000000001B212000-memory.dmp
    Filesize

    8KB

  • memory/572-60-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/572-59-0x00000000757C1000-0x00000000757C3000-memory.dmp
    Filesize

    8KB

  • memory/784-100-0x0000000000000000-mapping.dmp
  • memory/884-93-0x0000000000A60000-0x0000000000A62000-memory.dmp
    Filesize

    8KB

  • memory/884-85-0x0000000000000000-mapping.dmp
  • memory/1252-101-0x0000000000000000-mapping.dmp
  • memory/1412-82-0x0000000000000000-mapping.dmp
  • memory/1412-98-0x0000000004C40000-0x0000000004C41000-memory.dmp
    Filesize

    4KB

  • memory/1464-97-0x0000000004E20000-0x0000000004E21000-memory.dmp
    Filesize

    4KB

  • memory/1464-62-0x0000000000000000-mapping.dmp
  • memory/1464-73-0x00000000013D0000-0x00000000013D1000-memory.dmp
    Filesize

    4KB

  • memory/1500-103-0x0000000000000000-mapping.dmp
  • memory/1532-108-0x0000000000EA0000-0x0000000000EA1000-memory.dmp
    Filesize

    4KB

  • memory/1532-106-0x0000000000000000-mapping.dmp
  • memory/1532-111-0x0000000000870000-0x0000000000871000-memory.dmp
    Filesize

    4KB

  • memory/1628-112-0x0000000000000000-mapping.dmp
  • memory/1628-115-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB

  • memory/1628-118-0x000000001AB70000-0x000000001AB72000-memory.dmp
    Filesize

    8KB

  • memory/1644-86-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/1644-77-0x0000000000000000-mapping.dmp
  • memory/1660-119-0x0000000000000000-mapping.dmp
  • memory/1660-121-0x0000000000E80000-0x0000000000E81000-memory.dmp
    Filesize

    4KB

  • memory/1660-124-0x000000001B170000-0x000000001B172000-memory.dmp
    Filesize

    8KB

  • memory/1824-94-0x0000000000000000-mapping.dmp
  • memory/1920-99-0x0000000000000000-mapping.dmp