Analysis
-
max time kernel
151s -
max time network
187s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
02-11-2021 01:46
Static task
static1
Behavioral task
behavioral1
Sample
996570A4F29509E3C74AA361E578F59001460810064F4.exe
Resource
win7-en-20210920
General
-
Target
996570A4F29509E3C74AA361E578F59001460810064F4.exe
-
Size
73KB
-
MD5
7de9b1373f7e080121792869b172c537
-
SHA1
452f18d117ca728604b660f30aaafcd4f0c217f9
-
SHA256
996570a4f29509e3c74aa361e578f59001460810064f4a81be520e18291d56ab
-
SHA512
ae50753118eed6328e1c425ae8545034c9d782867eb8bd3d9a828309b7b19c6134cae2f2e0f44def4a0dc50f3eca743a2e6ffbf8a5287203aaf22050568b1d9a
Malware Config
Extracted
njrat
0.7d
04040404
soportes.duckdns.org:2023
28a056e3673b28a4055fb90e48d147ab
-
reg_key
28a056e3673b28a4055fb90e48d147ab
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 1 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hJtyaQ.url 996570A4F29509E3C74AA361E578F59001460810064F4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exedescription pid process target process PID 556 set thread context of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exepid process 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe Token: SeDebugPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe Token: 33 1060 RegAsm.exe Token: SeIncBasePriorityPrivilege 1060 RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.execsc.exeRegAsm.exedescription pid process target process PID 556 wrote to memory of 1740 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe csc.exe PID 556 wrote to memory of 1740 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe csc.exe PID 556 wrote to memory of 1740 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe csc.exe PID 556 wrote to memory of 1740 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe csc.exe PID 1740 wrote to memory of 604 1740 csc.exe cvtres.exe PID 1740 wrote to memory of 604 1740 csc.exe cvtres.exe PID 1740 wrote to memory of 604 1740 csc.exe cvtres.exe PID 1740 wrote to memory of 604 1740 csc.exe cvtres.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 556 wrote to memory of 1060 556 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 1060 wrote to memory of 1076 1060 RegAsm.exe netsh.exe PID 1060 wrote to memory of 1076 1060 RegAsm.exe netsh.exe PID 1060 wrote to memory of 1076 1060 RegAsm.exe netsh.exe PID 1060 wrote to memory of 1076 1060 RegAsm.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\996570A4F29509E3C74AA361E578F59001460810064F4.exe"C:\Users\Admin\AppData\Local\Temp\996570A4F29509E3C74AA361E578F59001460810064F4.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2xox5s2k\2xox5s2k.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES48C3.tmp" "c:\Users\Admin\AppData\Local\Temp\2xox5s2k\CSC7C1831E54ECD4F88B88FA2456537271.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2xox5s2k\2xox5s2k.dllMD5
d2473f3b50307150997b1a124c54b299
SHA1f71f14144e8fd1a4c01541d9089e22fcc3868e6f
SHA256c921f3c72e367ec05a32212839b994acf7ab8fae1610fab6df3e2fd1dceee12f
SHA51281672d13a42ba75d0a2342f8623d44a4b754df5a69a73d1dba3ae8fa8c3f5d7fc275daac22a78e9e15b6b687c7dcde012c9b95d290cc39986772c920b6b9813c
-
C:\Users\Admin\AppData\Local\Temp\2xox5s2k\2xox5s2k.pdbMD5
bb7a6a7227341fdf2afc8462d3cc676f
SHA1e71ee469f841c57622800f0c3270afe9ac58bbc9
SHA2563ab30ad8d4ff0fd36c723ed103e04b5660919226e5d08283ba956c56698644bd
SHA5127eb07705457898c37c30303bc22d800e35a6a16c08efdfd2cffb6fc0d3c93657852e3c36acf37345cec7d120b8a6929bea8835a61542ef7719ee91692f8ba066
-
C:\Users\Admin\AppData\Local\Temp\RES48C3.tmpMD5
f2af9959191ba457da6e0c1af3ae1bdd
SHA11d11a8e0b29f400cbbf63aa46b3872fdf2a8bc41
SHA25609acffb0eff6523c47b0f2815f2dd6dc2c19d30353c23525d93ca919033b2163
SHA5121517bd7041d10f51de2487c34b8e1b284f7beaabfcbd6c1927844b2a21f66c71b7304d275f539b81051ea6f3d170cec1676157705f8b35d9ede2be095ec19489
-
\??\c:\Users\Admin\AppData\Local\Temp\2xox5s2k\2xox5s2k.0.csMD5
43843ea478ecc41b366642a2d6a65de7
SHA1302951dfb877c63bf428a24f52de4e22a7176373
SHA256daf0b1fff1975fa6a4acb4cab65191e922585d90e09a7ab5215a15f1b4089d57
SHA5120d1f3ab2c4c8b21ef47ccf01be72c2c2cc07f1a2c5650cc85aaa51be32b8959739d13a2e9fe4454ca3a8759fdf9b836514cf80ca09fa323e8228fbd47cb72e61
-
\??\c:\Users\Admin\AppData\Local\Temp\2xox5s2k\2xox5s2k.cmdlineMD5
eff141141eb64992c3b04fc1f0c23efb
SHA17cf4d1687786fc1f350262efeb056d5e0744358c
SHA2564681a3a0955b5fa72d4c5dd97a1d60803b7508e49e40723ebf09a9aa1b65a7db
SHA512fa6200ab448bca1ff2ca189a83bcaddafe5005d2ef94b413ff8d563644dfc43a591ffd8a2e01c2c14bf1d40edb4f023313e870104345b90d8fe6a0ac24983a8a
-
\??\c:\Users\Admin\AppData\Local\Temp\2xox5s2k\CSC7C1831E54ECD4F88B88FA2456537271.TMPMD5
750ae3e0e4f5a317c184f297daa223ab
SHA17d926df6179e2bd46dc476e7939b383214010152
SHA256c1ae1c73d3409b1b04c2424ef68e984bee00f6a4d6444522d170aa6ac2102d67
SHA5122a53aa1d98cdf9b707bbd3c45656fea105157ee6e8bc37186d54c8961e97d13d446adee7803806d260e89017735a782725df7020af70bfe6842e39060149f80a
-
memory/556-67-0x0000000000290000-0x0000000000296000-memory.dmpFilesize
24KB
-
memory/556-56-0x0000000004E50000-0x0000000004E51000-memory.dmpFilesize
4KB
-
memory/556-68-0x0000000000740000-0x0000000000746000-memory.dmpFilesize
24KB
-
memory/556-54-0x0000000000EE0000-0x0000000000EE1000-memory.dmpFilesize
4KB
-
memory/556-65-0x0000000000200000-0x0000000000202000-memory.dmpFilesize
8KB
-
memory/556-66-0x0000000000280000-0x0000000000290000-memory.dmpFilesize
64KB
-
memory/604-60-0x0000000000000000-mapping.dmp
-
memory/1060-72-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1060-71-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1060-70-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1060-74-0x000000000040748E-mapping.dmp
-
memory/1060-73-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1060-69-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1060-75-0x0000000074B41000-0x0000000074B43000-memory.dmpFilesize
8KB
-
memory/1060-76-0x0000000000820000-0x0000000000821000-memory.dmpFilesize
4KB
-
memory/1076-77-0x0000000000000000-mapping.dmp
-
memory/1740-57-0x0000000000000000-mapping.dmp