Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    30-09-2021 08:06

General

  • Target

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe

  • Size

    3.3MB

  • MD5

    a72d3ef38b9b0d80d375ac97883f7470

  • SHA1

    2bc6af59a6790ad806863240cf64569e02809cc3

  • SHA256

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc

  • SHA512

    ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

Hook

C2

conqhook.ddns.net:6522

Mutex

System

Attributes
  • reg_key

    System

  • splitter

    |-F-|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Drops startup file 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
    "C:\Users\Admin\AppData\Local\Temp\baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
      "C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2696
    • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
      "C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3720
      • C:\Users\Admin\AppData\Roaming\System.exe
        "C:\Users\Admin\AppData\Roaming\System.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe"
          4⤵
          • Drops startup file
          • Views/modifies file attributes
          PID:1848
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.exe"
          4⤵
          • Views/modifies file attributes
          PID:1728
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Roaming\System.exe"
        3⤵
        • Views/modifies file attributes
        PID:1896

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
    MD5

    325a8a4176a51b4dbe3aa14c72f63fb9

    SHA1

    a6badd3bf3f2cbaac5d1576f4640ae68b70cac24

    SHA256

    afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc

    SHA512

    a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHook.GUI.exe
    MD5

    325a8a4176a51b4dbe3aa14c72f63fb9

    SHA1

    a6badd3bf3f2cbaac5d1576f4640ae68b70cac24

    SHA256

    afdb2d31131a92ef6d5001846f595233f37e0fb56947161f9f95d2bb18fb3fbc

    SHA512

    a3e148a6cce91d74000f5aa934352277fbe11c6f9bddb18ca6df4a054918f69caf1b429b4fb6e216ce515bb9da49a38fcd17208bea638b76ba1d550a98674bff

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Hook\GUI\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk
    MD5

    b4937299988cd8806e065582c50b0d2b

    SHA1

    e50485ed472fc64ad822ccfdd0df8fc12ecaf85c

    SHA256

    c1d2cdde6571513499c4ff240aa680ce350f0696597286102e86dd4986ed4d2a

    SHA512

    29bdd20239614de3108df6adb2e9faae4008f48cc10eb0f9390bb2b332724c96c2bac36943fe40c351d43b37951d0c42028bacee644b8c07bdeef01f06bbfb2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\System.lnk
    MD5

    d9ad547bc712c6b177ab83ba4c4c293d

    SHA1

    1628b49db7976815e07c46142cb3d69b887cbcd7

    SHA256

    f8104d0e751c17b978af7429c2f167af2643c40bc7c8b22c2f03e884e20bb56e

    SHA512

    608fb5d6e3620d277f3a1a660612ed5bf39cae87d452a804baad1244763fcf672798778a9ecac1115f623e7fa6e6082b82e7158373d2c9188eb4268cf420d4ea

  • C:\Users\Admin\AppData\Roaming\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • C:\Users\Admin\AppData\Roaming\System.exe
    MD5

    a89670f783f344004a3342f01770cc82

    SHA1

    5ad773f03aef3af1f8ceee2e9ab2ab37b86bae54

    SHA256

    83e11501a042ac6f6b00155a39e138f51717759c9a29bfdd482f9b1fe8075b61

    SHA512

    3f9803e85580c47016baf0d2aa871727fbbd3df812a972cfbb7dca6ed8a56e072efe7e048d3df8a0480e1fb122970981d8e29e757ff1c7938ee37e17731d407a

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Bot.dll
    MD5

    a896ed3cb5eeca8e6f37e9af7d944f5d

    SHA1

    ccd245973f8914391fbf95c132bdb1c956a98ea7

    SHA256

    11d9ff7a8f5f82a914a85c6859c38f3e0f27c1a1435fa2bd9bef3b1cf03cb411

    SHA512

    e494815ed4dd8ebf6d8389a61dc2190eb2d46d4e7c2d018c2fe8b09fa49ed8b3499c4affc98ec1da881c910da506ceaddc68d1bfb9d48c23bb3cdf8e4d38a668

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • \Users\Admin\AppData\Roaming\Hook\GUI\ConqHookV2.Shared.dll
    MD5

    9ab431731ee59ab0ec78f627b46099a7

    SHA1

    5cc18cdc26a2a1a864e855efb674bec48ad03b6b

    SHA256

    28ff2a818388f704cad0f4f224605f181e185de0beed342519b1bc6f0e1de159

    SHA512

    8950475571e60d18f5adc4f42ec234d908b580aefae91328d88d02a992eec8755c654c01fba9a69feab8ef9739b7e60c975aef2eb3986d2e2d27c570b50a5309

  • memory/924-139-0x0000000000000000-mapping.dmp
  • memory/924-145-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
    Filesize

    4KB

  • memory/1728-147-0x0000000000000000-mapping.dmp
  • memory/1848-146-0x0000000000000000-mapping.dmp
  • memory/1896-142-0x0000000000000000-mapping.dmp
  • memory/2696-124-0x0000000007EA0000-0x0000000007EA1000-memory.dmp
    Filesize

    4KB

  • memory/2696-125-0x0000000007A40000-0x0000000007A41000-memory.dmp
    Filesize

    4KB

  • memory/2696-133-0x0000000007C90000-0x0000000007C91000-memory.dmp
    Filesize

    4KB

  • memory/2696-122-0x0000000000C00000-0x0000000000C01000-memory.dmp
    Filesize

    4KB

  • memory/2696-126-0x00000000079C0000-0x00000000079C1000-memory.dmp
    Filesize

    4KB

  • memory/2696-137-0x000000000EFF0000-0x000000000EFF1000-memory.dmp
    Filesize

    4KB

  • memory/2696-127-0x00000000079A0000-0x0000000007E9E000-memory.dmp
    Filesize

    5.0MB

  • memory/2696-131-0x0000000007DE0000-0x0000000007DE1000-memory.dmp
    Filesize

    4KB

  • memory/2696-115-0x0000000000000000-mapping.dmp
  • memory/3720-121-0x0000000002C70000-0x0000000002C71000-memory.dmp
    Filesize

    4KB

  • memory/3720-118-0x0000000000000000-mapping.dmp