Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
02-11-2021 01:46
Static task
static1
Behavioral task
behavioral1
Sample
996570A4F29509E3C74AA361E578F59001460810064F4.exe
Resource
win7-en-20210920
General
-
Target
996570A4F29509E3C74AA361E578F59001460810064F4.exe
-
Size
73KB
-
MD5
7de9b1373f7e080121792869b172c537
-
SHA1
452f18d117ca728604b660f30aaafcd4f0c217f9
-
SHA256
996570a4f29509e3c74aa361e578f59001460810064f4a81be520e18291d56ab
-
SHA512
ae50753118eed6328e1c425ae8545034c9d782867eb8bd3d9a828309b7b19c6134cae2f2e0f44def4a0dc50f3eca743a2e6ffbf8a5287203aaf22050568b1d9a
Malware Config
Extracted
njrat
0.7d
04040404
soportes.duckdns.org:2023
28a056e3673b28a4055fb90e48d147ab
-
reg_key
28a056e3673b28a4055fb90e48d147ab
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 1 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hJtyaQ.url 996570A4F29509E3C74AA361E578F59001460810064F4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exedescription pid process target process PID 2220 set thread context of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exepid process 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe Token: SeDebugPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe Token: 33 4368 RegAsm.exe Token: SeIncBasePriorityPrivilege 4368 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
996570A4F29509E3C74AA361E578F59001460810064F4.execsc.exeRegAsm.exedescription pid process target process PID 2220 wrote to memory of 748 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe csc.exe PID 2220 wrote to memory of 748 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe csc.exe PID 2220 wrote to memory of 748 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe csc.exe PID 748 wrote to memory of 4016 748 csc.exe cvtres.exe PID 748 wrote to memory of 4016 748 csc.exe cvtres.exe PID 748 wrote to memory of 4016 748 csc.exe cvtres.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 2220 wrote to memory of 4368 2220 996570A4F29509E3C74AA361E578F59001460810064F4.exe RegAsm.exe PID 4368 wrote to memory of 3124 4368 RegAsm.exe netsh.exe PID 4368 wrote to memory of 3124 4368 RegAsm.exe netsh.exe PID 4368 wrote to memory of 3124 4368 RegAsm.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\996570A4F29509E3C74AA361E578F59001460810064F4.exe"C:\Users\Admin\AppData\Local\Temp\996570A4F29509E3C74AA361E578F59001460810064F4.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jtyaj4ut\jtyaj4ut.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA20D.tmp" "c:\Users\Admin\AppData\Local\Temp\jtyaj4ut\CSCF03D4DA3A6E848098FE9C772AF049B7.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESA20D.tmpMD5
c700a8f904245cde707e6ddbb51e2ceb
SHA1ba92885922e6eee160b9d9cfcbe2ae7dd7f4e572
SHA256a44fa2b088ee576698da39023901dad03091881fdcdffa8853c423cf11936212
SHA512ffc8226dded0196380419d8c632d888ed2a56657e01d7e35315361c536149394060eb69fd2c2ba692bbaa9282889d4e13a55415c4e89a64850edd0dca22b6c9d
-
C:\Users\Admin\AppData\Local\Temp\jtyaj4ut\jtyaj4ut.dllMD5
a56235cc772cf945a946874b1c8f68b9
SHA1062626b9cadae2a8acec5b55c4adfe169d13fafd
SHA256032e9057d3a77f05c065263ad307200c85dfc10d1393ee196e5580368b3eb16f
SHA51200b13ecec6c4a8e91c9f6700fc4381cd2e443d85a2819917bb367517307e13cda608ba8aca3c60d19ed784ffa45f9ace7bcd4478f8df15f5eabf9d2ee57ba329
-
C:\Users\Admin\AppData\Local\Temp\jtyaj4ut\jtyaj4ut.pdbMD5
7802a214d00fa7efeccd5cb4220e2e90
SHA11bb44676e576ac5b82bf001177a6dc2a5de8bf4a
SHA256565fe3ab980a49472e72244d64326358167853c56af6fa52e4c22e5c3f99cfae
SHA512c4a88050377738b834e7eae96728413af45bbb4002e69c47b391d6e65c161d82481c3666bff94fed5ca65f203748858223a233fb7537706cf7f73ed1cd67e2eb
-
\??\c:\Users\Admin\AppData\Local\Temp\jtyaj4ut\CSCF03D4DA3A6E848098FE9C772AF049B7.TMPMD5
952496a271868360233a0815ae390108
SHA12b70afc1fdcc32fcb01d581fec5a4db343770327
SHA25681c888d6bbce82ce4714d80e84a6a423b51459621819b3475b2a8d54efdbbf18
SHA512c308d46277094a4c0282f5c1e10af32414d657e119dbbdb74d7fbabdc70ba92f6726122983a88d0f65e938912988871d8676a1a38360babd3f16bcea5326c2e6
-
\??\c:\Users\Admin\AppData\Local\Temp\jtyaj4ut\jtyaj4ut.0.csMD5
43843ea478ecc41b366642a2d6a65de7
SHA1302951dfb877c63bf428a24f52de4e22a7176373
SHA256daf0b1fff1975fa6a4acb4cab65191e922585d90e09a7ab5215a15f1b4089d57
SHA5120d1f3ab2c4c8b21ef47ccf01be72c2c2cc07f1a2c5650cc85aaa51be32b8959739d13a2e9fe4454ca3a8759fdf9b836514cf80ca09fa323e8228fbd47cb72e61
-
\??\c:\Users\Admin\AppData\Local\Temp\jtyaj4ut\jtyaj4ut.cmdlineMD5
b8a67009abc537df6d7bc5b645432851
SHA16bcb0d3b9b496290047f2f0a52f6c8495a019c6e
SHA2561967b3ec7a66010ea05f4623169e18358211a472c13ec8c695d5dfbf6cc4f270
SHA51211b076208a670ad960a8577ca5ac3f185a7753d16a7ab966753d2a4518e85499ce0e6cf7bbacb194985a804fc76d67a07a85facb504c8edbf649637902804cc3
-
memory/748-118-0x0000000000000000-mapping.dmp
-
memory/2220-131-0x0000000005C20000-0x0000000005C21000-memory.dmpFilesize
4KB
-
memory/2220-117-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB
-
memory/2220-126-0x0000000003390000-0x0000000003392000-memory.dmpFilesize
8KB
-
memory/2220-127-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/2220-128-0x0000000005810000-0x0000000005820000-memory.dmpFilesize
64KB
-
memory/2220-129-0x0000000005B40000-0x0000000005B46000-memory.dmpFilesize
24KB
-
memory/2220-130-0x0000000005B70000-0x0000000005B76000-memory.dmpFilesize
24KB
-
memory/2220-115-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/3124-135-0x0000000000000000-mapping.dmp
-
memory/4016-121-0x0000000000000000-mapping.dmp
-
memory/4368-132-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4368-133-0x000000000040748E-mapping.dmp
-
memory/4368-134-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB