Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
30-09-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win10v20210408
General
-
Target
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
-
Size
3.3MB
-
MD5
a72d3ef38b9b0d80d375ac97883f7470
-
SHA1
2bc6af59a6790ad806863240cf64569e02809cc3
-
SHA256
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
SHA512
ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40
Malware Config
Extracted
njrat
v2.0
Hook
conqhook.ddns.net:6522
System
-
reg_key
System
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ConqHook.GUI.exeSystem.exeSystem.exepid process 2016 ConqHook.GUI.exe 1400 System.exe 1636 System.exe -
Drops startup file 5 IoCs
Processes:
System.exeSystem.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe attrib.exe -
Loads dropped DLL 7 IoCs
Processes:
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exeConqHook.GUI.exeSystem.exepid process 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe 2016 ConqHook.GUI.exe 2016 ConqHook.GUI.exe 2016 ConqHook.GUI.exe 2016 ConqHook.GUI.exe 1400 System.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
System.exeSystem.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\System.exe" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
System.exedescription pid process Token: SeDebugPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe Token: 33 1636 System.exe Token: SeIncBasePriorityPrivilege 1636 System.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exeSystem.exeSystem.exedescription pid process target process PID 1740 wrote to memory of 2016 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1740 wrote to memory of 2016 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1740 wrote to memory of 2016 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1740 wrote to memory of 2016 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1740 wrote to memory of 1400 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1740 wrote to memory of 1400 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1740 wrote to memory of 1400 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1740 wrote to memory of 1400 1740 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1400 wrote to memory of 1636 1400 System.exe System.exe PID 1400 wrote to memory of 1636 1400 System.exe System.exe PID 1400 wrote to memory of 1636 1400 System.exe System.exe PID 1400 wrote to memory of 1636 1400 System.exe System.exe PID 1400 wrote to memory of 1752 1400 System.exe attrib.exe PID 1400 wrote to memory of 1752 1400 System.exe attrib.exe PID 1400 wrote to memory of 1752 1400 System.exe attrib.exe PID 1400 wrote to memory of 1752 1400 System.exe attrib.exe PID 1636 wrote to memory of 952 1636 System.exe attrib.exe PID 1636 wrote to memory of 952 1636 System.exe attrib.exe PID 1636 wrote to memory of 952 1636 System.exe attrib.exe PID 1636 wrote to memory of 952 1636 System.exe attrib.exe PID 1636 wrote to memory of 956 1636 System.exe attrib.exe PID 1636 wrote to memory of 956 1636 System.exe attrib.exe PID 1636 wrote to memory of 956 1636 System.exe attrib.exe PID 1636 wrote to memory of 956 1636 System.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 1752 attrib.exe 952 attrib.exe 956 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe"4⤵
- Drops startup file
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.exe"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnkMD5
f9efdfc94ac6e6a222ee59f6021b1c64
SHA1a4004482b1e3c679ebdef7e8a39c6541fd1714ac
SHA25687137f042335e06d5349326ad889c66fb66afeb20df11e1ae00df473ec0909f9
SHA512a06ee4a7f2cb70593b274353e9825a2f4c018e6e380eef995fcfa8b54b07a3b840e3bc7cf4fcaeb19dae860b141bf711c3798a4bbfa9167dccf1bb6981c4176c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.lnkMD5
316cacb136e2214f23105fc25a74115c
SHA1505ef2a940eabbea678864e5b16b14b7b501f96f
SHA25667269e74378355c4ae6771d5f8520a9d780ff0675f88135b73aa4e800cf5febc
SHA5124179fe5c96b30437c015133356b810bd00498f54754adb36b0908026c43a32289d1a025ab283be663b63c3d32eb0972f126a913c69b1bfdae3a00d2b8a0e215d
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
memory/952-88-0x0000000000000000-mapping.dmp
-
memory/956-89-0x0000000000000000-mapping.dmp
-
memory/1400-64-0x0000000000F10000-0x0000000000F11000-memory.dmpFilesize
4KB
-
memory/1400-60-0x0000000000000000-mapping.dmp
-
memory/1636-87-0x0000000000C30000-0x0000000000C31000-memory.dmpFilesize
4KB
-
memory/1636-80-0x0000000000000000-mapping.dmp
-
memory/1740-54-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB
-
memory/1752-84-0x0000000000000000-mapping.dmp
-
memory/2016-67-0x0000000006FF0000-0x0000000006FF1000-memory.dmpFilesize
4KB
-
memory/2016-56-0x0000000000000000-mapping.dmp
-
memory/2016-71-0x0000000002030000-0x0000000002031000-memory.dmpFilesize
4KB
-
memory/2016-77-0x000000000D2B0000-0x000000000D2B1000-memory.dmpFilesize
4KB
-
memory/2016-73-0x0000000001E10000-0x0000000001E11000-memory.dmpFilesize
4KB
-
memory/2016-65-0x0000000000040000-0x0000000000041000-memory.dmpFilesize
4KB