Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
04-10-2021 12:16
Behavioral task
behavioral1
Sample
a7ffebe2d929cb30d09a5f97bf04bf4d.exe
Resource
win7-en-20210920
General
-
Target
a7ffebe2d929cb30d09a5f97bf04bf4d.exe
-
Size
37KB
-
MD5
a7ffebe2d929cb30d09a5f97bf04bf4d
-
SHA1
0973fa934cbac60167827c6131330f5c1455b6c2
-
SHA256
6d8714bcd12dc506609b53ee525e2ee435e154c3c4b1087c8285f3fd2e678dcd
-
SHA512
18ce4fa53d4dbce473c488260eeb641e8967cea99bbac480589ff4289b995f168a2b882a41c3e68f860e8e1a2b8d96bd850826895699fbf7966a4f97882661e2
Malware Config
Extracted
njrat
im523
HacKed
8.tcp.ngrok.io:18888
0b353c48530e21bc19ab5b01d126c6b8
-
reg_key
0b353c48530e21bc19ab5b01d126c6b8
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 1 IoCs
Processes:
Yougoofynigga.exepid process 1164 Yougoofynigga.exe -
Modifies Windows Firewall 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Yougoofynigga.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\0b353c48530e21bc19ab5b01d126c6b8 = "\"C:\\Windows\\Yougoofynigga.exe\" .." Yougoofynigga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\0b353c48530e21bc19ab5b01d126c6b8 = "\"C:\\Windows\\Yougoofynigga.exe\" .." Yougoofynigga.exe -
Drops file in Windows directory 3 IoCs
Processes:
a7ffebe2d929cb30d09a5f97bf04bf4d.exeYougoofynigga.exedescription ioc process File created C:\Windows\Yougoofynigga.exe a7ffebe2d929cb30d09a5f97bf04bf4d.exe File opened for modification C:\Windows\Yougoofynigga.exe a7ffebe2d929cb30d09a5f97bf04bf4d.exe File opened for modification C:\Windows\Yougoofynigga.exe Yougoofynigga.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
Yougoofynigga.exedescription pid process Token: SeDebugPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe Token: 33 1164 Yougoofynigga.exe Token: SeIncBasePriorityPrivilege 1164 Yougoofynigga.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a7ffebe2d929cb30d09a5f97bf04bf4d.exeYougoofynigga.exedescription pid process target process PID 2004 wrote to memory of 1164 2004 a7ffebe2d929cb30d09a5f97bf04bf4d.exe Yougoofynigga.exe PID 2004 wrote to memory of 1164 2004 a7ffebe2d929cb30d09a5f97bf04bf4d.exe Yougoofynigga.exe PID 2004 wrote to memory of 1164 2004 a7ffebe2d929cb30d09a5f97bf04bf4d.exe Yougoofynigga.exe PID 2004 wrote to memory of 1164 2004 a7ffebe2d929cb30d09a5f97bf04bf4d.exe Yougoofynigga.exe PID 1164 wrote to memory of 1556 1164 Yougoofynigga.exe netsh.exe PID 1164 wrote to memory of 1556 1164 Yougoofynigga.exe netsh.exe PID 1164 wrote to memory of 1556 1164 Yougoofynigga.exe netsh.exe PID 1164 wrote to memory of 1556 1164 Yougoofynigga.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ffebe2d929cb30d09a5f97bf04bf4d.exe"C:\Users\Admin\AppData\Local\Temp\a7ffebe2d929cb30d09a5f97bf04bf4d.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\Yougoofynigga.exe"C:\Windows\Yougoofynigga.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Yougoofynigga.exe" "Yougoofynigga.exe" ENABLE3⤵PID:1556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a7ffebe2d929cb30d09a5f97bf04bf4d
SHA10973fa934cbac60167827c6131330f5c1455b6c2
SHA2566d8714bcd12dc506609b53ee525e2ee435e154c3c4b1087c8285f3fd2e678dcd
SHA51218ce4fa53d4dbce473c488260eeb641e8967cea99bbac480589ff4289b995f168a2b882a41c3e68f860e8e1a2b8d96bd850826895699fbf7966a4f97882661e2
-
MD5
a7ffebe2d929cb30d09a5f97bf04bf4d
SHA10973fa934cbac60167827c6131330f5c1455b6c2
SHA2566d8714bcd12dc506609b53ee525e2ee435e154c3c4b1087c8285f3fd2e678dcd
SHA51218ce4fa53d4dbce473c488260eeb641e8967cea99bbac480589ff4289b995f168a2b882a41c3e68f860e8e1a2b8d96bd850826895699fbf7966a4f97882661e2