Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
02-11-2021 14:31
Static task
static1
Behavioral task
behavioral1
Sample
Q4EtLThkYlEkFvu.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Q4EtLThkYlEkFvu.exe
Resource
win10-en-20210920
General
-
Target
Q4EtLThkYlEkFvu.exe
-
Size
474KB
-
MD5
18156edcb0549e6e856811b5a57b951d
-
SHA1
c9c773a0157562c8fa800aad23c670486fd63fbd
-
SHA256
8c6ca1c8128480b39bed5d584b13880534bc0155cf05df5ab5ebd1dc63f53207
-
SHA512
c881d069a6403a22b02ee71dd062fdb6718f23c6c1de859d142dcd9e4c642555c3c5f72bc6b0aa1bab3ff6539a7c59e3415bca0b8f636cfcc5b9dbd5afb39775
Malware Config
Extracted
njrat
v4.0
order1
45.137.22.146:5553
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 4 IoCs
Processes:
Payload.exePayload.exePayload.exePayload.exepid process 1084 Payload.exe 1152 Payload.exe 1708 Payload.exe 1104 Payload.exe -
Drops startup file 2 IoCs
Processes:
Q4EtLThkYlEkFvu.exePayload.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Q4EtLThkYlEkFvu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Q4EtLThkYlEkFvu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Windows\\Payload.exe" Q4EtLThkYlEkFvu.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Q4EtLThkYlEkFvu.exePayload.exedescription pid process target process PID 1376 set thread context of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1084 set thread context of 1104 1084 Payload.exe Payload.exe -
Drops file in Windows directory 2 IoCs
Processes:
Q4EtLThkYlEkFvu.exeattrib.exedescription ioc process File created C:\Windows\Payload.exe Q4EtLThkYlEkFvu.exe File opened for modification C:\Windows\Payload.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Payload.exepid process 1084 Payload.exe 1084 Payload.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
Payload.exePayload.exedescription pid process Token: SeDebugPrivilege 1084 Payload.exe Token: SeDebugPrivilege 1104 Payload.exe Token: 33 1104 Payload.exe Token: SeIncBasePriorityPrivilege 1104 Payload.exe Token: 33 1104 Payload.exe Token: SeIncBasePriorityPrivilege 1104 Payload.exe Token: 33 1104 Payload.exe Token: SeIncBasePriorityPrivilege 1104 Payload.exe Token: 33 1104 Payload.exe Token: SeIncBasePriorityPrivilege 1104 Payload.exe Token: 33 1104 Payload.exe Token: SeIncBasePriorityPrivilege 1104 Payload.exe Token: 33 1104 Payload.exe Token: SeIncBasePriorityPrivilege 1104 Payload.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
Q4EtLThkYlEkFvu.exeQ4EtLThkYlEkFvu.exePayload.exedescription pid process target process PID 1376 wrote to memory of 832 1376 Q4EtLThkYlEkFvu.exe schtasks.exe PID 1376 wrote to memory of 832 1376 Q4EtLThkYlEkFvu.exe schtasks.exe PID 1376 wrote to memory of 832 1376 Q4EtLThkYlEkFvu.exe schtasks.exe PID 1376 wrote to memory of 832 1376 Q4EtLThkYlEkFvu.exe schtasks.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 1376 wrote to memory of 552 1376 Q4EtLThkYlEkFvu.exe Q4EtLThkYlEkFvu.exe PID 552 wrote to memory of 1084 552 Q4EtLThkYlEkFvu.exe Payload.exe PID 552 wrote to memory of 1084 552 Q4EtLThkYlEkFvu.exe Payload.exe PID 552 wrote to memory of 1084 552 Q4EtLThkYlEkFvu.exe Payload.exe PID 552 wrote to memory of 1084 552 Q4EtLThkYlEkFvu.exe Payload.exe PID 552 wrote to memory of 1660 552 Q4EtLThkYlEkFvu.exe attrib.exe PID 552 wrote to memory of 1660 552 Q4EtLThkYlEkFvu.exe attrib.exe PID 552 wrote to memory of 1660 552 Q4EtLThkYlEkFvu.exe attrib.exe PID 552 wrote to memory of 1660 552 Q4EtLThkYlEkFvu.exe attrib.exe PID 1084 wrote to memory of 1856 1084 Payload.exe schtasks.exe PID 1084 wrote to memory of 1856 1084 Payload.exe schtasks.exe PID 1084 wrote to memory of 1856 1084 Payload.exe schtasks.exe PID 1084 wrote to memory of 1856 1084 Payload.exe schtasks.exe PID 1084 wrote to memory of 1152 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1152 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1152 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1152 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1708 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1708 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1708 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1708 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe PID 1084 wrote to memory of 1104 1084 Payload.exe Payload.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\Q4EtLThkYlEkFvu.exe"C:\Users\Admin\AppData\Local\Temp\Q4EtLThkYlEkFvu.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yqbepZrEYRD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F77.tmp"2⤵
- Creates scheduled task(s)
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Q4EtLThkYlEkFvu.exe"C:\Users\Admin\AppData\Local\Temp\Q4EtLThkYlEkFvu.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\Payload.exe"C:\Windows\Payload.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yqbepZrEYRD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp223.tmp"4⤵
- Creates scheduled task(s)
PID:1856 -
C:\Windows\Payload.exe"C:\Windows\Payload.exe"4⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\Payload.exe"C:\Windows\Payload.exe"4⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\Payload.exe"C:\Windows\Payload.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Windows\Payload.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:1660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b9622246a2ed61171999ee678f6cc470
SHA1947ec795fbe97ce8c9b4622b456353716faceefa
SHA256bb8e11992d8f89c50638b95705372a1d5d136784844ccdb98e44ceb79af96056
SHA512102f07473a2ee840f197e8279042b7e5f591d85d238d8ed8a11309f9ed3a6b7f54771a9d163b326ac74f7ac7f411d1114f42e938599ce4d11caaf3cd4b881d1e
-
MD5
f6cb7b462491f3bd6758b9848a25fa09
SHA113875fca8b81fcc40cff20a9337d04d704adbaac
SHA2568e1c016974f9f54989bacb9ee970508471d3dec83d0938a41c718bee667077df
SHA5123d86c05351743f0ba38e843f4022e2931bede4a273dfd1d257eff420d1329d998f6619209023033d8185743249f0bfd7ff50d0e5cd6bc2b065698aca303727f9
-
MD5
18156edcb0549e6e856811b5a57b951d
SHA1c9c773a0157562c8fa800aad23c670486fd63fbd
SHA2568c6ca1c8128480b39bed5d584b13880534bc0155cf05df5ab5ebd1dc63f53207
SHA512c881d069a6403a22b02ee71dd062fdb6718f23c6c1de859d142dcd9e4c642555c3c5f72bc6b0aa1bab3ff6539a7c59e3415bca0b8f636cfcc5b9dbd5afb39775
-
MD5
18156edcb0549e6e856811b5a57b951d
SHA1c9c773a0157562c8fa800aad23c670486fd63fbd
SHA2568c6ca1c8128480b39bed5d584b13880534bc0155cf05df5ab5ebd1dc63f53207
SHA512c881d069a6403a22b02ee71dd062fdb6718f23c6c1de859d142dcd9e4c642555c3c5f72bc6b0aa1bab3ff6539a7c59e3415bca0b8f636cfcc5b9dbd5afb39775
-
MD5
18156edcb0549e6e856811b5a57b951d
SHA1c9c773a0157562c8fa800aad23c670486fd63fbd
SHA2568c6ca1c8128480b39bed5d584b13880534bc0155cf05df5ab5ebd1dc63f53207
SHA512c881d069a6403a22b02ee71dd062fdb6718f23c6c1de859d142dcd9e4c642555c3c5f72bc6b0aa1bab3ff6539a7c59e3415bca0b8f636cfcc5b9dbd5afb39775
-
MD5
18156edcb0549e6e856811b5a57b951d
SHA1c9c773a0157562c8fa800aad23c670486fd63fbd
SHA2568c6ca1c8128480b39bed5d584b13880534bc0155cf05df5ab5ebd1dc63f53207
SHA512c881d069a6403a22b02ee71dd062fdb6718f23c6c1de859d142dcd9e4c642555c3c5f72bc6b0aa1bab3ff6539a7c59e3415bca0b8f636cfcc5b9dbd5afb39775
-
MD5
18156edcb0549e6e856811b5a57b951d
SHA1c9c773a0157562c8fa800aad23c670486fd63fbd
SHA2568c6ca1c8128480b39bed5d584b13880534bc0155cf05df5ab5ebd1dc63f53207
SHA512c881d069a6403a22b02ee71dd062fdb6718f23c6c1de859d142dcd9e4c642555c3c5f72bc6b0aa1bab3ff6539a7c59e3415bca0b8f636cfcc5b9dbd5afb39775