Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-09-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win10v20210408
General
-
Target
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
-
Size
3.3MB
-
MD5
a72d3ef38b9b0d80d375ac97883f7470
-
SHA1
2bc6af59a6790ad806863240cf64569e02809cc3
-
SHA256
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
SHA512
ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40
Malware Config
Extracted
njrat
v2.0
Hook
conqhook.ddns.net:6522
System
-
reg_key
System
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ConqHook.GUI.exeSystem.exeSystem.exepid process 2228 ConqHook.GUI.exe 1776 System.exe 1004 System.exe -
Drops startup file 5 IoCs
Processes:
System.exeSystem.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe attrib.exe -
Loads dropped DLL 4 IoCs
Processes:
ConqHook.GUI.exepid process 2228 ConqHook.GUI.exe 2228 ConqHook.GUI.exe 2228 ConqHook.GUI.exe 2228 ConqHook.GUI.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
System.exeSystem.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\System.exe" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
System.exedescription pid process Token: SeDebugPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe Token: 33 1004 System.exe Token: SeIncBasePriorityPrivilege 1004 System.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exeSystem.exeSystem.exedescription pid process target process PID 4020 wrote to memory of 2228 4020 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 4020 wrote to memory of 2228 4020 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 4020 wrote to memory of 2228 4020 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 4020 wrote to memory of 1776 4020 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 4020 wrote to memory of 1776 4020 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 4020 wrote to memory of 1776 4020 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1776 wrote to memory of 1004 1776 System.exe System.exe PID 1776 wrote to memory of 1004 1776 System.exe System.exe PID 1776 wrote to memory of 1004 1776 System.exe System.exe PID 1776 wrote to memory of 700 1776 System.exe attrib.exe PID 1776 wrote to memory of 700 1776 System.exe attrib.exe PID 1776 wrote to memory of 700 1776 System.exe attrib.exe PID 1004 wrote to memory of 1508 1004 System.exe attrib.exe PID 1004 wrote to memory of 1508 1004 System.exe attrib.exe PID 1004 wrote to memory of 1508 1004 System.exe attrib.exe PID 1004 wrote to memory of 1576 1004 System.exe attrib.exe PID 1004 wrote to memory of 1576 1004 System.exe attrib.exe PID 1004 wrote to memory of 1576 1004 System.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 700 attrib.exe 1508 attrib.exe 1576 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe"4⤵
- Drops startup file
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.exe"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnkMD5
30ecd6585b3c28cc91eb8e505590872e
SHA1d04c6589c75a7b9d68c55365fabdc9d8bdb5b639
SHA256e7a6fd4fdb5a35044b04aa353e13d81482847a3daaec46a0e4023bbea047592b
SHA512a3d23d6620fe877b5f2c41653cde49e48941da81768d594aacf2715bcf9f4e251b14b1ca9871bc9869e45acf6b2fbb7a5b11ff00fa14129d32ffb47a4b2b96f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.lnkMD5
6325595e2c4c967a965b810a507abb10
SHA1d21aa5b2ff3557fcb7e5f0c005d73e5e585aaf57
SHA2562875ef14f2351f4ce712ade1d7fa6ea82815d460c541db6085349eb69a9ef79d
SHA512a898e52ea883aa801e53e7a743edc17b8ab8a8e799a5631bef19af186e8742c3b4c5d0d6dc3c8dc92803685e03d4eb5d88bfb7c4e8b5972489ee830910574226
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
memory/700-141-0x0000000000000000-mapping.dmp
-
memory/1004-138-0x0000000000000000-mapping.dmp
-
memory/1004-144-0x0000000002280000-0x0000000002281000-memory.dmpFilesize
4KB
-
memory/1508-145-0x0000000000000000-mapping.dmp
-
memory/1576-146-0x0000000000000000-mapping.dmp
-
memory/1776-122-0x00000000031A0000-0x00000000031A1000-memory.dmpFilesize
4KB
-
memory/1776-117-0x0000000000000000-mapping.dmp
-
memory/2228-124-0x0000000007440000-0x0000000007441000-memory.dmpFilesize
4KB
-
memory/2228-132-0x0000000007830000-0x0000000007831000-memory.dmpFilesize
4KB
-
memory/2228-123-0x00000000078A0000-0x00000000078A1000-memory.dmpFilesize
4KB
-
memory/2228-125-0x0000000007430000-0x0000000007431000-memory.dmpFilesize
4KB
-
memory/2228-120-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/2228-114-0x0000000000000000-mapping.dmp
-
memory/2228-126-0x00000000073A0000-0x000000000789E000-memory.dmpFilesize
5.0MB
-
memory/2228-136-0x000000000E9E0000-0x000000000E9E1000-memory.dmpFilesize
4KB
-
memory/2228-130-0x000000000AB40000-0x000000000AB41000-memory.dmpFilesize
4KB