Analysis

  • max time kernel
    146s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    30-09-2021 09:41

General

  • Target

    aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423.exe

  • Size

    991KB

  • MD5

    71cf0b826a586a2c77eacfde791ec14e

  • SHA1

    349a63989b801e1b9dee0960040ef7def96e28f6

  • SHA256

    aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423

  • SHA512

    eb7f487097dea3d90740bcb7751ea581a03a76c3e335a931515e3f66f7db94877587872a2bf385ee8d926283feee4ce151cdba22a77abcb3daa2ead0199d7171

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

septiembre2.duckdns.org:6633

Mutex

a2951ca84e184

Attributes
  • reg_key

    a2951ca84e184

  • splitter

    @!#&^%$

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423.exe
    "C:\Users\Admin\AppData\Local\Temp\aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423.exe
      "{path}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1256-54-0x0000000000A10000-0x0000000000A11000-memory.dmp
    Filesize

    4KB

  • memory/1256-56-0x0000000000470000-0x00000000004A1000-memory.dmp
    Filesize

    196KB

  • memory/1256-57-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
    Filesize

    4KB

  • memory/1256-59-0x0000000004CC2000-0x0000000004CC3000-memory.dmp
    Filesize

    4KB

  • memory/1256-58-0x0000000004CC1000-0x0000000004CC2000-memory.dmp
    Filesize

    4KB

  • memory/1256-60-0x0000000004CC7000-0x0000000004CD8000-memory.dmp
    Filesize

    68KB

  • memory/1256-61-0x0000000001F60000-0x0000000001F6E000-memory.dmp
    Filesize

    56KB

  • memory/1256-62-0x000000007EF40000-0x000000007EF41000-memory.dmp
    Filesize

    4KB

  • memory/1256-63-0x0000000005590000-0x00000000055EC000-memory.dmp
    Filesize

    368KB

  • memory/1256-64-0x0000000000510000-0x000000000051A000-memory.dmp
    Filesize

    40KB

  • memory/1752-65-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1752-66-0x000000000040676E-mapping.dmp
  • memory/1752-67-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1752-69-0x0000000000300000-0x0000000000301000-memory.dmp
    Filesize

    4KB