Analysis
-
max time kernel
152s -
max time network
174s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-09-2021 08:06
Static task
static1
Behavioral task
behavioral1
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win10-en-20210920
General
-
Target
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
-
Size
3.3MB
-
MD5
a72d3ef38b9b0d80d375ac97883f7470
-
SHA1
2bc6af59a6790ad806863240cf64569e02809cc3
-
SHA256
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
SHA512
ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40
Malware Config
Extracted
njrat
v2.0
Hook
conqhook.ddns.net:6522
System
-
reg_key
System
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ConqHook.GUI.exeSystem.exeSystem.exepid process 2016 ConqHook.GUI.exe 1036 System.exe 1704 System.exe -
Drops startup file 5 IoCs
Processes:
System.exeattrib.exeSystem.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe -
Loads dropped DLL 7 IoCs
Processes:
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exeConqHook.GUI.exeSystem.exepid process 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe 2016 ConqHook.GUI.exe 2016 ConqHook.GUI.exe 2016 ConqHook.GUI.exe 2016 ConqHook.GUI.exe 1036 System.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
System.exeSystem.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\System.exe" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
System.exedescription pid process Token: SeDebugPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe Token: 33 1704 System.exe Token: SeIncBasePriorityPrivilege 1704 System.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exeSystem.exeSystem.exedescription pid process target process PID 1924 wrote to memory of 2016 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1924 wrote to memory of 2016 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1924 wrote to memory of 2016 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1924 wrote to memory of 2016 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 1924 wrote to memory of 1036 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1924 wrote to memory of 1036 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1924 wrote to memory of 1036 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1924 wrote to memory of 1036 1924 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 1036 wrote to memory of 1704 1036 System.exe System.exe PID 1036 wrote to memory of 1704 1036 System.exe System.exe PID 1036 wrote to memory of 1704 1036 System.exe System.exe PID 1036 wrote to memory of 1704 1036 System.exe System.exe PID 1036 wrote to memory of 1664 1036 System.exe attrib.exe PID 1036 wrote to memory of 1664 1036 System.exe attrib.exe PID 1036 wrote to memory of 1664 1036 System.exe attrib.exe PID 1036 wrote to memory of 1664 1036 System.exe attrib.exe PID 1704 wrote to memory of 1932 1704 System.exe attrib.exe PID 1704 wrote to memory of 1932 1704 System.exe attrib.exe PID 1704 wrote to memory of 1932 1704 System.exe attrib.exe PID 1704 wrote to memory of 1932 1704 System.exe attrib.exe PID 1704 wrote to memory of 1936 1704 System.exe attrib.exe PID 1704 wrote to memory of 1936 1704 System.exe attrib.exe PID 1704 wrote to memory of 1936 1704 System.exe attrib.exe PID 1704 wrote to memory of 1936 1704 System.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 1664 attrib.exe 1932 attrib.exe 1936 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe"4⤵
- Drops startup file
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.exe"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnkMD5
4924721af37c077fa2ededeaf3233af8
SHA1bcb163d9a13b637122f6dcfda1c84c84ad605048
SHA2567e83cabc2d4b9815b27576b3ade78602a080ed1cb69b8fc82d6f60f207a3c6ff
SHA512e8e429420f882dfda555607d3497516dade9e6ee5d06be63c684a661df16af149ce4f4d77b6edf8f90284c3ad147c7a197424fac5fd6206cf2ab810745691ca2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.lnkMD5
94cbae867fb4f02d0e136f731772ed49
SHA1c8a910b668a378fd63adc8d990d550adf3222a49
SHA25606659f4c7945af876bbfcdb040f7a7d3771b27a59b4910d8fece35ace0907c2e
SHA5129d290e0d83f18fda2cf4f7e9693a3980d56552e8e51fd4ff8b516b7df964b0dc264fdc22cd8a821360b5e323b2d031697c1d905994dca7667f4be4d6a762b1a4
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
memory/1036-72-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/1036-66-0x0000000000000000-mapping.dmp
-
memory/1664-90-0x0000000000000000-mapping.dmp
-
memory/1704-93-0x0000000001F20000-0x0000000001F21000-memory.dmpFilesize
4KB
-
memory/1704-86-0x0000000000000000-mapping.dmp
-
memory/1924-60-0x0000000076691000-0x0000000076693000-memory.dmpFilesize
8KB
-
memory/1932-94-0x0000000000000000-mapping.dmp
-
memory/1936-95-0x0000000000000000-mapping.dmp
-
memory/2016-73-0x00000000044D0000-0x00000000044D1000-memory.dmpFilesize
4KB
-
memory/2016-62-0x0000000000000000-mapping.dmp
-
memory/2016-83-0x0000000007FB0000-0x0000000007FB1000-memory.dmpFilesize
4KB
-
memory/2016-70-0x0000000000E30000-0x0000000000E31000-memory.dmpFilesize
4KB
-
memory/2016-79-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/2016-77-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB