Analysis

  • max time kernel
    152s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    23-10-2021 21:13

General

  • Target

    Twitter Crack.exe

  • Size

    5.4MB

  • MD5

    87e2016d2af2214bb8bd71b20adcecb4

  • SHA1

    95e0c972f66ae2c0a6ffd41bf4aaeb24e6e567b1

  • SHA256

    9703bf9f3b22e8a8cd3b2797a2da5a48d326c9dde57dbe4481b6cbc634b81f04

  • SHA512

    b38ab45feaa97b689c11301e968c8b6087fa8513409fd0d517ff7d2d86ae9ca104e7d577c80cfb53fb87ddff684146326665385208674790220bcf5a19d6e81d

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

white monkey

C2

127.0.0.1:1177

Mutex

56af94ecf1deb5aa0dab576ea890f3e9

Attributes
  • reg_key

    56af94ecf1deb5aa0dab576ea890f3e9

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Twitter Crack.exe
    "C:\Users\Admin\AppData\Local\Temp\Twitter Crack.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Users\Admin\AppData\Local\Temp\snail.exe
      snail.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3096
      • C:\Users\Admin\AppData\Local\Temp\setup..exe
        "C:\Users\Admin\AppData\Local\Temp\setup..exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
          "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2944
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe" "nordvpn.exe" ENABLE
            5⤵
              PID:688
        • C:\Users\Admin\AppData\Local\Temp\setup_.exe
          "C:\Users\Admin\AppData\Local\Temp\setup_.exe"
          3⤵
          • Executes dropped EXE
          PID:1100
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 804
            4⤵
            • Program crash
            PID:4084

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\setup..exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\setup..exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\setup_.exe
      MD5

      1cd5240426985eb0e32e10606334c8ea

      SHA1

      f645cb1538ad0e8df89ac64210306e6862b108ed

      SHA256

      ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

      SHA512

      6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

    • C:\Users\Admin\AppData\Local\Temp\setup_.exe
      MD5

      1cd5240426985eb0e32e10606334c8ea

      SHA1

      f645cb1538ad0e8df89ac64210306e6862b108ed

      SHA256

      ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

      SHA512

      6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

    • C:\Users\Admin\AppData\Local\Temp\snail.exe
      MD5

      937c4ed05a3ecd221b5fed516392249c

      SHA1

      72f591422a654febc2dbf92922dc85e91da65fa7

      SHA256

      bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

      SHA512

      14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

    • C:\Users\Admin\AppData\Local\Temp\snail.exe
      MD5

      937c4ed05a3ecd221b5fed516392249c

      SHA1

      72f591422a654febc2dbf92922dc85e91da65fa7

      SHA256

      bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

      SHA512

      14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

    • memory/688-192-0x0000000000000000-mapping.dmp
    • memory/1100-159-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-378-0x0000000077310000-0x0000000077311000-memory.dmp
      Filesize

      4KB

    • memory/1100-127-0x00000000025EE000-0x00000000025EF000-memory.dmp
      Filesize

      4KB

    • memory/1100-129-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-130-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-131-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-132-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-133-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-134-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-135-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-136-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-137-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-138-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-139-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-140-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-162-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-142-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-144-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-143-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-146-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-147-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-148-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-145-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-149-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-150-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-151-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-152-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-153-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-154-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-155-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-156-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-157-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-158-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-126-0x00000000025ED000-0x00000000025EE000-memory.dmp
      Filesize

      4KB

    • memory/1100-160-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-161-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-141-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-128-0x00000000025EF000-0x00000000025F8000-memory.dmp
      Filesize

      36KB

    • memory/1100-173-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-167-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-379-0x00000000776E0000-0x00000000776E1000-memory.dmp
      Filesize

      4KB

    • memory/1100-164-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-169-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-166-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-165-0x0000000000400000-0x00000000008B6000-memory.dmp
      Filesize

      4.7MB

    • memory/1100-170-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-171-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-172-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-174-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-163-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-176-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-175-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-177-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-178-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-180-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-179-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-181-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-182-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-376-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
      Filesize

      4KB

    • memory/1100-185-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-183-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-189-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-190-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-125-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-193-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-191-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-124-0x00000000024F1000-0x00000000025C3000-memory.dmp
      Filesize

      840KB

    • memory/1100-186-0x00000000025C3000-0x00000000025E6000-memory.dmp
      Filesize

      140KB

    • memory/1100-120-0x0000000000000000-mapping.dmp
    • memory/1280-168-0x0000000003120000-0x0000000003121000-memory.dmp
      Filesize

      4KB

    • memory/1280-118-0x0000000000000000-mapping.dmp
    • memory/2944-231-0x00000000014A0000-0x00000000014A1000-memory.dmp
      Filesize

      4KB

    • memory/2944-184-0x0000000000000000-mapping.dmp
    • memory/2944-380-0x00000000014A3000-0x00000000014A5000-memory.dmp
      Filesize

      8KB

    • memory/3096-115-0x0000000000000000-mapping.dmp