Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
30-09-2021 08:06
Static task
static1
Behavioral task
behavioral1
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win10-en-20210920
General
-
Target
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
-
Size
3.3MB
-
MD5
a72d3ef38b9b0d80d375ac97883f7470
-
SHA1
2bc6af59a6790ad806863240cf64569e02809cc3
-
SHA256
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
SHA512
ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40
Malware Config
Extracted
njrat
v2.0
Hook
conqhook.ddns.net:6522
System
-
reg_key
System
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ConqHook.GUI.exeSystem.exeSystem.exepid process 2696 ConqHook.GUI.exe 3720 System.exe 924 System.exe -
Drops startup file 5 IoCs
Processes:
System.exeattrib.exeSystem.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe System.exe -
Loads dropped DLL 4 IoCs
Processes:
ConqHook.GUI.exepid process 2696 ConqHook.GUI.exe 2696 ConqHook.GUI.exe 2696 ConqHook.GUI.exe 2696 ConqHook.GUI.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
System.exeSystem.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\System.exe" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\System.URL" System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
System.exedescription pid process Token: SeDebugPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe Token: 33 924 System.exe Token: SeIncBasePriorityPrivilege 924 System.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exeSystem.exeSystem.exedescription pid process target process PID 2484 wrote to memory of 2696 2484 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 2484 wrote to memory of 2696 2484 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 2484 wrote to memory of 2696 2484 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe ConqHook.GUI.exe PID 2484 wrote to memory of 3720 2484 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 2484 wrote to memory of 3720 2484 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 2484 wrote to memory of 3720 2484 baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe System.exe PID 3720 wrote to memory of 924 3720 System.exe System.exe PID 3720 wrote to memory of 924 3720 System.exe System.exe PID 3720 wrote to memory of 924 3720 System.exe System.exe PID 3720 wrote to memory of 1896 3720 System.exe attrib.exe PID 3720 wrote to memory of 1896 3720 System.exe attrib.exe PID 3720 wrote to memory of 1896 3720 System.exe attrib.exe PID 924 wrote to memory of 1848 924 System.exe attrib.exe PID 924 wrote to memory of 1848 924 System.exe attrib.exe PID 924 wrote to memory of 1848 924 System.exe attrib.exe PID 924 wrote to memory of 1728 924 System.exe attrib.exe PID 924 wrote to memory of 1728 924 System.exe attrib.exe PID 924 wrote to memory of 1728 924 System.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 1896 attrib.exe 1848 attrib.exe 1728 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe"4⤵
- Drops startup file
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.exe"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exeMD5
325a8a4176a51b4dbe3aa14c72f63fb9
SHA1a6badd3bf3f2cbaac5d1576f4640ae68b70cac24
SHA256afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc
SHA512a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnkMD5
b4937299988cd8806e065582c50b0d2b
SHA1e50485ed472fc64ad822ccfdd0df8fc12ecaf85c
SHA256c1d2cdde6571513499c4ff240aa680ce350f0696597286102e86dd4986ed4d2a
SHA51229bdd20239614de3108df6adb2e9faae4008f48cc10eb0f9390bb2b332724c96c2bac36943fe40c351d43b37951d0c42028bacee644b8c07bdeef01f06bbfb2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.lnkMD5
d9ad547bc712c6b177ab83ba4c4c293d
SHA11628b49db7976815e07c46142cb3d69b887cbcd7
SHA256f8104d0e751c17b978af7429c2f167af2643c40bc7c8b22c2f03e884e20bb56e
SHA512608fb5d6e3620d277f3a1a660612ed5bf39cae87d452a804baad1244763fcf672798778a9ecac1115f623e7fa6e6082b82e7158373d2c9188eb4268cf420d4ea
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
C:\Users\Admin\AppData\Roaming\System.exeMD5
a89670f783f344004a3342f01770cc82
SHA15ad773f03aef3af1f8ceee2e9ab2ab37b86bae54
SHA25683e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61
SHA5123f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dllMD5
a896ed3cb5eeca8e6f37e9af7d944f5d
SHA1ccd245973f8914391fbf95c132bdb1c956a98ea7
SHA25611d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411
SHA512e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dllMD5
9ab431731ee59ab0ec78f627b46099a7
SHA15cc18cdc26a2a1a864e855efb674bec48ad03b6b
SHA25628ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159
SHA5128950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309
-
memory/924-139-0x0000000000000000-mapping.dmp
-
memory/924-145-0x0000000000FF0000-0x0000000000FF1000-memory.dmpFilesize
4KB
-
memory/1728-147-0x0000000000000000-mapping.dmp
-
memory/1848-146-0x0000000000000000-mapping.dmp
-
memory/1896-142-0x0000000000000000-mapping.dmp
-
memory/2696-124-0x0000000007EA0000-0x0000000007EA1000-memory.dmpFilesize
4KB
-
memory/2696-125-0x0000000007A40000-0x0000000007A41000-memory.dmpFilesize
4KB
-
memory/2696-133-0x0000000007C90000-0x0000000007C91000-memory.dmpFilesize
4KB
-
memory/2696-122-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/2696-126-0x00000000079C0000-0x00000000079C1000-memory.dmpFilesize
4KB
-
memory/2696-137-0x000000000EFF0000-0x000000000EFF1000-memory.dmpFilesize
4KB
-
memory/2696-127-0x00000000079A0000-0x0000000007E9E000-memory.dmpFilesize
5.0MB
-
memory/2696-131-0x0000000007DE0000-0x0000000007DE1000-memory.dmpFilesize
4KB
-
memory/2696-115-0x0000000000000000-mapping.dmp
-
memory/3720-121-0x0000000002C70000-0x0000000002C71000-memory.dmpFilesize
4KB
-
memory/3720-118-0x0000000000000000-mapping.dmp