Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-09-2021 13:20
Static task
static1
Behavioral task
behavioral1
Sample
424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe
Resource
win7-en-20210920
General
-
Target
424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe
-
Size
1009KB
-
MD5
dd50c188aabc9e550fc221de015ddb55
-
SHA1
068aa881159f72c4454f44f32fb754fc5b88f688
-
SHA256
424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8
-
SHA512
b63b109c27987c3b873c378707eb983c60b782e7e9a2ec0dafac7130ef17da0c034698aaa025cd6103cc5ba6e6fb4e13240a20c773fb2e7a981eef276e406b36
Malware Config
Extracted
njrat
0.7.3
Limebot3
microsoftdnsbug.duckdns.org:6699
Client.exe
-
reg_key
Client.exe
-
splitter
luffy
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
AppVCatalog.exeAppVCatalog.exepid process 528 AppVCatalog.exe 852 AppVCatalog.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exeAppVCatalog.exeAppVCatalog.exedescription pid process target process PID 1368 set thread context of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 528 set thread context of 572 528 AppVCatalog.exe RegAsm.exe PID 852 set thread context of 1824 852 AppVCatalog.exe RegAsm.exe -
autoit_exe 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe autoit_exe C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe autoit_exe C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1684 schtasks.exe 396 schtasks.exe 2032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exeAppVCatalog.exeAppVCatalog.exepid process 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe 528 AppVCatalog.exe 528 AppVCatalog.exe 852 AppVCatalog.exe 852 AppVCatalog.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe Token: 33 2036 RegAsm.exe Token: SeIncBasePriorityPrivilege 2036 RegAsm.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exetaskeng.exeAppVCatalog.exeAppVCatalog.exedescription pid process target process PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 2036 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe RegAsm.exe PID 1368 wrote to memory of 1684 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe schtasks.exe PID 1368 wrote to memory of 1684 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe schtasks.exe PID 1368 wrote to memory of 1684 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe schtasks.exe PID 1368 wrote to memory of 1684 1368 424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe schtasks.exe PID 1064 wrote to memory of 528 1064 taskeng.exe AppVCatalog.exe PID 1064 wrote to memory of 528 1064 taskeng.exe AppVCatalog.exe PID 1064 wrote to memory of 528 1064 taskeng.exe AppVCatalog.exe PID 1064 wrote to memory of 528 1064 taskeng.exe AppVCatalog.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 572 528 AppVCatalog.exe RegAsm.exe PID 528 wrote to memory of 396 528 AppVCatalog.exe schtasks.exe PID 528 wrote to memory of 396 528 AppVCatalog.exe schtasks.exe PID 528 wrote to memory of 396 528 AppVCatalog.exe schtasks.exe PID 528 wrote to memory of 396 528 AppVCatalog.exe schtasks.exe PID 1064 wrote to memory of 852 1064 taskeng.exe AppVCatalog.exe PID 1064 wrote to memory of 852 1064 taskeng.exe AppVCatalog.exe PID 1064 wrote to memory of 852 1064 taskeng.exe AppVCatalog.exe PID 1064 wrote to memory of 852 1064 taskeng.exe AppVCatalog.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 1824 852 AppVCatalog.exe RegAsm.exe PID 852 wrote to memory of 2032 852 AppVCatalog.exe schtasks.exe PID 852 wrote to memory of 2032 852 AppVCatalog.exe schtasks.exe PID 852 wrote to memory of 2032 852 AppVCatalog.exe schtasks.exe PID 852 wrote to memory of 2032 852 AppVCatalog.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe"C:\Users\Admin\AppData\Local\Temp\424b1800061eb3534756eada61219882687a8f99d206d300ba7e4696066aaac8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn PnPUnattend /tr "C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {95E437CC-E742-4704-811D-F3F8ACB54BE0} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exeC:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn PnPUnattend /tr "C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exeC:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn PnPUnattend /tr "C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exeMD5
b0443072d1ca7687b9f4f7fd6a4a3273
SHA1aeb6ad0f988d99f179306221e1ad63731174093c
SHA25657213c76228880bfc787b916f87d4a6d78ee74b0a84768c23622499d5291b199
SHA5120dd454093daf48c8864409ed595ec1c191ea72cda417537a7bfcc8a0acfd0d3f03be2b2790276527f50bd7e7b6b90a49874bce358e62d9da601e1e702784c973
-
C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exeMD5
b0443072d1ca7687b9f4f7fd6a4a3273
SHA1aeb6ad0f988d99f179306221e1ad63731174093c
SHA25657213c76228880bfc787b916f87d4a6d78ee74b0a84768c23622499d5291b199
SHA5120dd454093daf48c8864409ed595ec1c191ea72cda417537a7bfcc8a0acfd0d3f03be2b2790276527f50bd7e7b6b90a49874bce358e62d9da601e1e702784c973
-
C:\Users\Admin\CapabilityAccessHandlers\AppVCatalog.exeMD5
b0443072d1ca7687b9f4f7fd6a4a3273
SHA1aeb6ad0f988d99f179306221e1ad63731174093c
SHA25657213c76228880bfc787b916f87d4a6d78ee74b0a84768c23622499d5291b199
SHA5120dd454093daf48c8864409ed595ec1c191ea72cda417537a7bfcc8a0acfd0d3f03be2b2790276527f50bd7e7b6b90a49874bce358e62d9da601e1e702784c973
-
memory/396-81-0x0000000000000000-mapping.dmp
-
memory/528-68-0x0000000000000000-mapping.dmp
-
memory/572-80-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/572-76-0x0000000000414E6E-mapping.dmp
-
memory/852-82-0x0000000000000000-mapping.dmp
-
memory/1368-64-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/1368-54-0x0000000075821000-0x0000000075823000-memory.dmpFilesize
8KB
-
memory/1684-66-0x0000000000000000-mapping.dmp
-
memory/1824-94-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1824-90-0x0000000000414E6E-mapping.dmp
-
memory/2032-95-0x0000000000000000-mapping.dmp
-
memory/2036-62-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2036-55-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2036-60-0x0000000000414E6E-mapping.dmp
-
memory/2036-61-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2036-65-0x0000000000700000-0x0000000000701000-memory.dmpFilesize
4KB