Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-09-2021 07:38

General

  • Target

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe

  • Size

    3.3MB

  • MD5

    a72d3ef38b9b0d80d375ac97883f7470

  • SHA1

    2bc6af59a6790ad806863240cf64569e02809cc3

  • SHA256

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc

  • SHA512

    ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

Hook

C2

conqhook.ddns.net:6522

Mutex

System

Attributes
  • reg_key

    System

  • splitter

    |-F-|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Drops startup file 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
    "C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
      "C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2228
    • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
      "C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Users\Admin\AppData\Roaming\System.exe
        "C:\Users\Admin\AppData\Roaming\System.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1004
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe"
          4⤵
          • Drops startup file
          • Views/modifies file attributes
          PID:1508
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.exe"
          4⤵
          • Views/modifies file attributes
          PID:1576
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Roaming\System.exe"
        3⤵
        • Views/modifies file attributes
        PID:700

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
    MD5

    325a8a4176a51b4dbe3aa14c72f63fb9

    SHA1

    a6badd3bf3f2cbaac5d1576f4640ae68b70cac24

    SHA256

    afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc

    SHA512

    a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
    MD5

    325a8a4176a51b4dbe3aa14c72f63fb9

    SHA1

    a6badd3bf3f2cbaac5d1576f4640ae68b70cac24

    SHA256

    afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc

    SHA512

    a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk
    MD5

    30ecd6585b3c28cc91eb8e505590872e

    SHA1

    d04c6589c75a7b9d68c55365fabdc9d8bdb5b639

    SHA256

    e7a6fd4fdb5a35044b04aa353e13d81482847a3daaec46a0e4023bbea047592b

    SHA512

    a3d23d6620fe877b5f2c41653cde49e48941da81768d594aacf2715bcf9f4e251b14b1ca9871bc9869e45acf6b2fbb7a5b11ff00fa14129d32ffb47a4b2b96f4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.lnk
    MD5

    6325595e2c4c967a965b810a507abb10

    SHA1

    d21aa5b2ff3557fcb7e5f0c005d73e5e585aaf57

    SHA256

    2875ef14f2351f4ce712ade1d7fa6ea82815d460c541db6085349eb69a9ef79d

    SHA512

    a898e52ea883aa801e53e7a743edc17b8ab8a8e799a5631bef19af186e8742c3b4c5d0d6dc3c8dc92803685e03d4eb5d88bfb7c4e8b5972489ee830910574226

  • C:\Users\Admin\AppData\Roaming\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • memory/700-141-0x0000000000000000-mapping.dmp
  • memory/1004-138-0x0000000000000000-mapping.dmp
  • memory/1004-144-0x0000000002280000-0x0000000002281000-memory.dmp
    Filesize

    4KB

  • memory/1508-145-0x0000000000000000-mapping.dmp
  • memory/1576-146-0x0000000000000000-mapping.dmp
  • memory/1776-122-0x00000000031A0000-0x00000000031A1000-memory.dmp
    Filesize

    4KB

  • memory/1776-117-0x0000000000000000-mapping.dmp
  • memory/2228-124-0x0000000007440000-0x0000000007441000-memory.dmp
    Filesize

    4KB

  • memory/2228-132-0x0000000007830000-0x0000000007831000-memory.dmp
    Filesize

    4KB

  • memory/2228-123-0x00000000078A0000-0x00000000078A1000-memory.dmp
    Filesize

    4KB

  • memory/2228-125-0x0000000007430000-0x0000000007431000-memory.dmp
    Filesize

    4KB

  • memory/2228-120-0x0000000000530000-0x0000000000531000-memory.dmp
    Filesize

    4KB

  • memory/2228-114-0x0000000000000000-mapping.dmp
  • memory/2228-126-0x00000000073A0000-0x000000000789E000-memory.dmp
    Filesize

    5.0MB

  • memory/2228-136-0x000000000E9E0000-0x000000000E9E1000-memory.dmp
    Filesize

    4KB

  • memory/2228-130-0x000000000AB40000-0x000000000AB41000-memory.dmp
    Filesize

    4KB