Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    23-10-2021 21:13

General

  • Target

    Twitter Crack.exe

  • Size

    5.4MB

  • MD5

    87e2016d2af2214bb8bd71b20adcecb4

  • SHA1

    95e0c972f66ae2c0a6ffd41bf4aaeb24e6e567b1

  • SHA256

    9703bf9f3b22e8a8cd3b2797a2da5a48d326c9dde57dbe4481b6cbc634b81f04

  • SHA512

    b38ab45feaa97b689c11301e968c8b6087fa8513409fd0d517ff7d2d86ae9ca104e7d577c80cfb53fb87ddff684146326665385208674790220bcf5a19d6e81d

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

white monkey

C2

127.0.0.1:1177

Mutex

56af94ecf1deb5aa0dab576ea890f3e9

Attributes
  • reg_key

    56af94ecf1deb5aa0dab576ea890f3e9

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Twitter Crack.exe
    "C:\Users\Admin\AppData\Local\Temp\Twitter Crack.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Users\Admin\AppData\Local\Temp\snail.exe
      snail.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Users\Admin\AppData\Local\Temp\setup..exe
        "C:\Users\Admin\AppData\Local\Temp\setup..exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
          "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe"
          4⤵
          • Executes dropped EXE
          PID:1936
      • C:\Users\Admin\AppData\Local\Temp\setup_.exe
        "C:\Users\Admin\AppData\Local\Temp\setup_.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:676

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • C:\Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • C:\Users\Admin\AppData\Local\Temp\snail.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • C:\Users\Admin\AppData\Local\Temp\snail.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • \Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • \Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\snail.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • \Users\Admin\AppData\Local\Temp\snail.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • memory/676-101-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-108-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-77-0x00000000023CE000-0x00000000023CF000-memory.dmp
    Filesize

    4KB

  • memory/676-78-0x00000000023CF000-0x00000000023D8000-memory.dmp
    Filesize

    36KB

  • memory/676-79-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-80-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-346-0x0000000076BE0000-0x0000000076BE1000-memory.dmp
    Filesize

    4KB

  • memory/676-345-0x00000000756E0000-0x00000000756E1000-memory.dmp
    Filesize

    4KB

  • memory/676-65-0x0000000000000000-mapping.dmp
  • memory/676-83-0x0000000000400000-0x00000000008B6000-memory.dmp
    Filesize

    4.7MB

  • memory/676-84-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-86-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-85-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-87-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-88-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-89-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-90-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-91-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-92-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-93-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-82-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-94-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-95-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-96-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-97-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-98-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-99-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-100-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-75-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-102-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-103-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-104-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-105-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-106-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-107-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-76-0x00000000023CD000-0x00000000023CE000-memory.dmp
    Filesize

    4KB

  • memory/676-109-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-110-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-111-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-112-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-113-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-114-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-115-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-116-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-118-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-117-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-119-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-120-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-121-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-122-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-123-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-124-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-126-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-125-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-127-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-129-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-128-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-130-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-131-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-132-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-133-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-134-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-135-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-136-0x00000000023A3000-0x00000000023C6000-memory.dmp
    Filesize

    140KB

  • memory/676-323-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/676-74-0x00000000022D1000-0x00000000023A3000-memory.dmp
    Filesize

    840KB

  • memory/1408-57-0x0000000000000000-mapping.dmp
  • memory/1408-59-0x0000000075F41000-0x0000000075F43000-memory.dmp
    Filesize

    8KB

  • memory/1564-81-0x0000000000BA0000-0x0000000000BA1000-memory.dmp
    Filesize

    4KB

  • memory/1564-62-0x0000000000000000-mapping.dmp
  • memory/1936-322-0x0000000000000000-mapping.dmp
  • memory/1936-344-0x0000000000340000-0x0000000000341000-memory.dmp
    Filesize

    4KB