Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
25-09-2021 23:53
Static task
static1
Behavioral task
behavioral1
Sample
Windows Security Health Service.bin.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Windows Security Health Service.bin.exe
Resource
win10v20210408
General
-
Target
Windows Security Health Service.bin.exe
-
Size
595KB
-
MD5
ba38fee6928359b14d6ab46fd1c6a2e2
-
SHA1
d0ffbbdb618a86af97c9a37f8d506cff3b91e377
-
SHA256
1cc94a68355afc41f13a6c6136b0d0d212f33a92e1f53a51075f05d49f541310
-
SHA512
c1b9650c75a777455e4b8e21e5b01fbf7457928ab4545f5fc74d589da3c27d4ebf7c334c2d9bb5334c401cbf1a8fb68569eded934613799ba018b2261caf3a74
Malware Config
Extracted
njrat
v4.0
HacKed
blackhacked.ddns.net:5555
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
Windows Security Health Service.exeInstallUtil.exeWindows Security Health Service.exeWindows Security Health Service.exepid process 640 Windows Security Health Service.exe 1380 InstallUtil.exe 1264 Windows Security Health Service.exe 1748 Windows Security Health Service.exe -
Drops startup file 3 IoCs
Processes:
Windows Security Health Service.bin.exeInstallUtil.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exe Windows Security Health Service.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exe Windows Security Health Service.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk InstallUtil.exe -
Loads dropped DLL 4 IoCs
Processes:
Windows Security Health Service.bin.exeWindows Security Health Service.exeWindows Security Health Service.exepid process 1464 Windows Security Health Service.bin.exe 640 Windows Security Health Service.exe 640 Windows Security Health Service.exe 1264 Windows Security Health Service.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1464-57-0x0000000000D40000-0x0000000000D61000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Security Health Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Windows Security Health Service.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Windows Security Health Service.exedescription pid process target process PID 640 set thread context of 1380 640 Windows Security Health Service.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
Windows Security Health Service.bin.exeWindows Security Health Service.exeWindows Security Health Service.exepid process 1464 Windows Security Health Service.bin.exe 1464 Windows Security Health Service.bin.exe 1464 Windows Security Health Service.bin.exe 1464 Windows Security Health Service.bin.exe 640 Windows Security Health Service.exe 640 Windows Security Health Service.exe 640 Windows Security Health Service.exe 640 Windows Security Health Service.exe 1264 Windows Security Health Service.exe 640 Windows Security Health Service.exe 640 Windows Security Health Service.exe 640 Windows Security Health Service.exe 640 Windows Security Health Service.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
Windows Security Health Service.bin.exeWindows Security Health Service.exeWindows Security Health Service.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1464 Windows Security Health Service.bin.exe Token: SeDebugPrivilege 640 Windows Security Health Service.exe Token: SeDebugPrivilege 1264 Windows Security Health Service.exe Token: SeDebugPrivilege 1380 InstallUtil.exe Token: 33 1380 InstallUtil.exe Token: SeIncBasePriorityPrivilege 1380 InstallUtil.exe Token: 33 1380 InstallUtil.exe Token: SeIncBasePriorityPrivilege 1380 InstallUtil.exe Token: 33 1380 InstallUtil.exe Token: SeIncBasePriorityPrivilege 1380 InstallUtil.exe Token: 33 1380 InstallUtil.exe Token: SeIncBasePriorityPrivilege 1380 InstallUtil.exe Token: 33 1380 InstallUtil.exe Token: SeIncBasePriorityPrivilege 1380 InstallUtil.exe Token: 33 1380 InstallUtil.exe Token: SeIncBasePriorityPrivilege 1380 InstallUtil.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
Windows Security Health Service.bin.execmd.exeWindows Security Health Service.exeWindows Security Health Service.exedescription pid process target process PID 1464 wrote to memory of 1140 1464 Windows Security Health Service.bin.exe cmd.exe PID 1464 wrote to memory of 1140 1464 Windows Security Health Service.bin.exe cmd.exe PID 1464 wrote to memory of 1140 1464 Windows Security Health Service.bin.exe cmd.exe PID 1464 wrote to memory of 1140 1464 Windows Security Health Service.bin.exe cmd.exe PID 1140 wrote to memory of 596 1140 cmd.exe reg.exe PID 1140 wrote to memory of 596 1140 cmd.exe reg.exe PID 1140 wrote to memory of 596 1140 cmd.exe reg.exe PID 1140 wrote to memory of 596 1140 cmd.exe reg.exe PID 1464 wrote to memory of 640 1464 Windows Security Health Service.bin.exe Windows Security Health Service.exe PID 1464 wrote to memory of 640 1464 Windows Security Health Service.bin.exe Windows Security Health Service.exe PID 1464 wrote to memory of 640 1464 Windows Security Health Service.bin.exe Windows Security Health Service.exe PID 1464 wrote to memory of 640 1464 Windows Security Health Service.bin.exe Windows Security Health Service.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1380 640 Windows Security Health Service.exe InstallUtil.exe PID 640 wrote to memory of 1264 640 Windows Security Health Service.exe Windows Security Health Service.exe PID 640 wrote to memory of 1264 640 Windows Security Health Service.exe Windows Security Health Service.exe PID 640 wrote to memory of 1264 640 Windows Security Health Service.exe Windows Security Health Service.exe PID 640 wrote to memory of 1264 640 Windows Security Health Service.exe Windows Security Health Service.exe PID 1264 wrote to memory of 1748 1264 Windows Security Health Service.exe Windows Security Health Service.exe PID 1264 wrote to memory of 1748 1264 Windows Security Health Service.exe Windows Security Health Service.exe PID 1264 wrote to memory of 1748 1264 Windows Security Health Service.exe Windows Security Health Service.exe PID 1264 wrote to memory of 1748 1264 Windows Security Health Service.exe Windows Security Health Service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.bin.exe"C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.bin.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Windows Security Health Service" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Windows Security Health Service" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exe"3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exe"C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exe"C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeMD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeMD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exeMD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exeMD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exeMD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.txtMD5
07903b62ce8bb459ec9a63e2357df7bd
SHA1bcfc3021586e12fb8723876ef0d0591feb843807
SHA256c356075477c96a18087bcff4460b28748c53aab248a44507086f0c07ecd139a6
SHA512734da0647de778f48721de3dfa7990e0d4e73a29deb08492bb88656a5a3cc3d7ea1436d2a48bc0e16cf2ef768386ddb1ee3a27faedc2837b2f4513f99113d831
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Health Service.txtMD5
9f729a8bf65fccae42f1e29b2d4815dd
SHA18e0837f23d7c4613ba2b8a1c97322f3113f36907
SHA256135c3c097924bdfa00852b86ddd83c2cdbcc908c4260c0eef137b3f1286a8d7e
SHA512e4a3b1cded444561f5d2a89bc8fbffba2432e40a339354eb06b6dbb7368f6ffc0ffed92970dd6dde828d565ca84cd4d1786a985c3becc98baac84553d00fb167
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exeMD5
ba38fee6928359b14d6ab46fd1c6a2e2
SHA1d0ffbbdb618a86af97c9a37f8d506cff3b91e377
SHA2561cc94a68355afc41f13a6c6136b0d0d212f33a92e1f53a51075f05d49f541310
SHA512c1b9650c75a777455e4b8e21e5b01fbf7457928ab4545f5fc74d589da3c27d4ebf7c334c2d9bb5334c401cbf1a8fb68569eded934613799ba018b2261caf3a74
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exeMD5
ba38fee6928359b14d6ab46fd1c6a2e2
SHA1d0ffbbdb618a86af97c9a37f8d506cff3b91e377
SHA2561cc94a68355afc41f13a6c6136b0d0d212f33a92e1f53a51075f05d49f541310
SHA512c1b9650c75a777455e4b8e21e5b01fbf7457928ab4545f5fc74d589da3c27d4ebf7c334c2d9bb5334c401cbf1a8fb68569eded934613799ba018b2261caf3a74
-
\Users\Admin\AppData\Local\Temp\InstallUtil.exeMD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exeMD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
\Users\Admin\AppData\Local\Temp\Windows Security Health Service.exeMD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Health Service.exeMD5
ba38fee6928359b14d6ab46fd1c6a2e2
SHA1d0ffbbdb618a86af97c9a37f8d506cff3b91e377
SHA2561cc94a68355afc41f13a6c6136b0d0d212f33a92e1f53a51075f05d49f541310
SHA512c1b9650c75a777455e4b8e21e5b01fbf7457928ab4545f5fc74d589da3c27d4ebf7c334c2d9bb5334c401cbf1a8fb68569eded934613799ba018b2261caf3a74
-
memory/596-60-0x0000000000000000-mapping.dmp
-
memory/640-67-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/640-62-0x0000000000000000-mapping.dmp
-
memory/640-72-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB
-
memory/640-71-0x0000000000BE0000-0x0000000000BEB000-memory.dmpFilesize
44KB
-
memory/640-70-0x0000000004EF1000-0x0000000004EF2000-memory.dmpFilesize
4KB
-
memory/640-65-0x0000000001070000-0x0000000001071000-memory.dmpFilesize
4KB
-
memory/1140-59-0x0000000000000000-mapping.dmp
-
memory/1264-84-0x0000000000E60000-0x0000000000E61000-memory.dmpFilesize
4KB
-
memory/1264-81-0x0000000000000000-mapping.dmp
-
memory/1380-78-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1380-76-0x000000000040837E-mapping.dmp
-
memory/1380-75-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1380-91-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/1464-53-0x0000000000EF0000-0x0000000000EF1000-memory.dmpFilesize
4KB
-
memory/1464-58-0x0000000004C91000-0x0000000004C92000-memory.dmpFilesize
4KB
-
memory/1464-57-0x0000000000D40000-0x0000000000D61000-memory.dmpFilesize
132KB
-
memory/1464-55-0x0000000004C90000-0x0000000004C91000-memory.dmpFilesize
4KB
-
memory/1748-88-0x0000000000000000-mapping.dmp