Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-10-2021 07:36
Behavioral task
behavioral1
Sample
a872f0414e0834acab687a8beb9b3a6b.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
a872f0414e0834acab687a8beb9b3a6b.exe
Resource
win10-en-20211014
General
-
Target
a872f0414e0834acab687a8beb9b3a6b.exe
-
Size
43KB
-
MD5
a872f0414e0834acab687a8beb9b3a6b
-
SHA1
3c5e60d56a0fe1378453e38ee4be9a589f3f6f83
-
SHA256
e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
-
SHA512
22c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
???
0.tcp.ngrok.io:15651
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 3 IoCs
Processes:
Dllhost.exeServer.exeServer.exepid process 780 Dllhost.exe 1708 Server.exe 1484 Server.exe -
Drops startup file 2 IoCs
Processes:
Dllhost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Dllhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Roaming\\Dllhost.exe\" .." Dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Roaming\\Dllhost.exe\" .." Dllhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
a872f0414e0834acab687a8beb9b3a6b.exeDllhost.exepid process 2680 a872f0414e0834acab687a8beb9b3a6b.exe 780 Dllhost.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
Dllhost.exedescription pid process Token: SeDebugPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe Token: 33 780 Dllhost.exe Token: SeIncBasePriorityPrivilege 780 Dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a872f0414e0834acab687a8beb9b3a6b.exeDllhost.exedescription pid process target process PID 2680 wrote to memory of 780 2680 a872f0414e0834acab687a8beb9b3a6b.exe Dllhost.exe PID 2680 wrote to memory of 780 2680 a872f0414e0834acab687a8beb9b3a6b.exe Dllhost.exe PID 2680 wrote to memory of 780 2680 a872f0414e0834acab687a8beb9b3a6b.exe Dllhost.exe PID 780 wrote to memory of 3480 780 Dllhost.exe schtasks.exe PID 780 wrote to memory of 3480 780 Dllhost.exe schtasks.exe PID 780 wrote to memory of 3480 780 Dllhost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a872f0414e0834acab687a8beb9b3a6b.exe"C:\Users\Admin\AppData\Local\Temp\a872f0414e0834acab687a8beb9b3a6b.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\Dllhost.exe"C:\Users\Admin\AppData\Roaming\Dllhost.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe3⤵
- Creates scheduled task(s)
PID:3480
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe1⤵
- Executes dropped EXE
PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe1⤵
- Executes dropped EXE
PID:1484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0de4a673c46d192f575c41e7c80ffc3e
SHA17a1da7e8ec2efd904ecb237ebedd4d7a3ee826f1
SHA256c18d0ff8e7b83a8623a8515d91d65f68deef6da9f68d84886864177f45acbf65
SHA512b505619848b2f6038e68a2d7baaa4cf314d39023a5b7a32001262ecda03a905986ac8a45a249745e29637b0acfaba1ae06bfaecc678283a808e6f9f4b455e209
-
MD5
a872f0414e0834acab687a8beb9b3a6b
SHA13c5e60d56a0fe1378453e38ee4be9a589f3f6f83
SHA256e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
SHA51222c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db
-
MD5
a872f0414e0834acab687a8beb9b3a6b
SHA13c5e60d56a0fe1378453e38ee4be9a589f3f6f83
SHA256e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
SHA51222c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db
-
MD5
a872f0414e0834acab687a8beb9b3a6b
SHA13c5e60d56a0fe1378453e38ee4be9a589f3f6f83
SHA256e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
SHA51222c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db
-
MD5
a872f0414e0834acab687a8beb9b3a6b
SHA13c5e60d56a0fe1378453e38ee4be9a589f3f6f83
SHA256e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
SHA51222c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db
-
MD5
a872f0414e0834acab687a8beb9b3a6b
SHA13c5e60d56a0fe1378453e38ee4be9a589f3f6f83
SHA256e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
SHA51222c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db