Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    30-09-2021 07:38

General

  • Target

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe

  • Size

    3.3MB

  • MD5

    a72d3ef38b9b0d80d375ac97883f7470

  • SHA1

    2bc6af59a6790ad806863240cf64569e02809cc3

  • SHA256

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc

  • SHA512

    ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

Hook

C2

conqhook.ddns.net:6522

Mutex

System

Attributes
  • reg_key

    System

  • splitter

    |-F-|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Drops startup file 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
    "C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
      "C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2016
    • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
      "C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Roaming\System.exe
        "C:\Users\Admin\AppData\Roaming\System.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe"
          4⤵
          • Drops startup file
          • Views/modifies file attributes
          PID:952
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.exe"
          4⤵
          • Views/modifies file attributes
          PID:956
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Roaming\System.exe"
        3⤵
        • Views/modifies file attributes
        PID:1752

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
    MD5

    325a8a4176a51b4dbe3aa14c72f63fb9

    SHA1

    a6badd3bf3f2cbaac5d1576f4640ae68b70cac24

    SHA256

    afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc

    SHA512

    a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
    MD5

    325a8a4176a51b4dbe3aa14c72f63fb9

    SHA1

    a6badd3bf3f2cbaac5d1576f4640ae68b70cac24

    SHA256

    afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc

    SHA512

    a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk
    MD5

    f9efdfc94ac6e6a222ee59f6021b1c64

    SHA1

    a4004482b1e3c679ebdef7e8a39c6541fd1714ac

    SHA256

    87137f042335e06d5349326ad889c66fb66afeb20df11e1ae00df473ec0909f9

    SHA512

    a06ee4a7f2cb70593b274353e9825a2f4c018e6e380eef995fcfa8b54b07a3b840e3bc7cf4fcaeb19dae860b141bf711c3798a4bbfa9167dccf1bb6981c4176c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.lnk
    MD5

    316cacb136e2214f23105fc25a74115c

    SHA1

    505ef2a940eabbea678864e5b16b14b7b501f96f

    SHA256

    67269e74378355c4ae6771d5f8520a9d780ff0675f88135b73aa4e800cf5febc

    SHA512

    4179fe5c96b30437c015133356b810bd00498f54754adb36b0908026c43a32289d1a025ab283be663b63c3d32eb0972f126a913c69b1bfdae3a00d2b8a0e215d

  • C:\Users\Admin\AppData\Roaming\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
    MD5

    325a8a4176a51b4dbe3aa14c72f63fb9

    SHA1

    a6badd3bf3f2cbaac5d1576f4640ae68b70cac24

    SHA256

    afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc

    SHA512

    a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • \Users\Admin\AppData\Roaming\Hook\GUI\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • \Users\Admin\AppData\Roaming\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • memory/952-88-0x0000000000000000-mapping.dmp
  • memory/956-89-0x0000000000000000-mapping.dmp
  • memory/1400-64-0x0000000000F10000-0x0000000000F11000-memory.dmp
    Filesize

    4KB

  • memory/1400-60-0x0000000000000000-mapping.dmp
  • memory/1636-87-0x0000000000C30000-0x0000000000C31000-memory.dmp
    Filesize

    4KB

  • memory/1636-80-0x0000000000000000-mapping.dmp
  • memory/1740-54-0x00000000765A1000-0x00000000765A3000-memory.dmp
    Filesize

    8KB

  • memory/1752-84-0x0000000000000000-mapping.dmp
  • memory/2016-67-0x0000000006FF0000-0x0000000006FF1000-memory.dmp
    Filesize

    4KB

  • memory/2016-56-0x0000000000000000-mapping.dmp
  • memory/2016-71-0x0000000002030000-0x0000000002031000-memory.dmp
    Filesize

    4KB

  • memory/2016-77-0x000000000D2B0000-0x000000000D2B1000-memory.dmp
    Filesize

    4KB

  • memory/2016-73-0x0000000001E10000-0x0000000001E11000-memory.dmp
    Filesize

    4KB

  • memory/2016-65-0x0000000000040000-0x0000000000041000-memory.dmp
    Filesize

    4KB