Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-11-2021 01:37
Static task
static1
Behavioral task
behavioral1
Sample
71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe
Resource
win7-en-20211104
General
-
Target
71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe
-
Size
222KB
-
MD5
9ba09fe66a6c0f30ccc1800487e14a33
-
SHA1
56a97a459acf4cd6403eaa174944f1d1db7957c6
-
SHA256
71078d7cf6428403d8e6298613b1d2932d16129a0e033f0c008abd7fb194ba80
-
SHA512
88679b1b788741d52c1a2d443fe4906231d1c7b7aa475bf1b22465d1e51001902f9d42aebc74680217cc69ecb79dbe1bad1e4962452b6416ae8071e6feb310b1
Malware Config
Extracted
njrat
0.7d
180721
185.222.57.203:2282
866d16940c2b513b37047e4f825bb8ff
-
reg_key
866d16940c2b513b37047e4f825bb8ff
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 3024 svchost.exe 3384 svchost.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\866d16940c2b513b37047e4f825bb8ff.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\866d16940c2b513b37047e4f825bb8ff.exe svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\866d16940c2b513b37047e4f825bb8ff = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\866d16940c2b513b37047e4f825bb8ff = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe\" .." svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
71078D7CF6428403D8E6298613B1D2932D16129A0E033.exesvchost.exedescription pid process target process PID 3584 set thread context of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3024 set thread context of 3384 3024 svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
71078D7CF6428403D8E6298613B1D2932D16129A0E033.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe Token: SeDebugPrivilege 3024 svchost.exe Token: SeDebugPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe Token: 33 3384 svchost.exe Token: SeIncBasePriorityPrivilege 3384 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe71078D7CF6428403D8E6298613B1D2932D16129A0E033.exesvchost.exesvchost.exedescription pid process target process PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 3584 wrote to memory of 2320 3584 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe PID 2320 wrote to memory of 3024 2320 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe svchost.exe PID 2320 wrote to memory of 3024 2320 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe svchost.exe PID 2320 wrote to memory of 3024 2320 71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3024 wrote to memory of 3384 3024 svchost.exe svchost.exe PID 3384 wrote to memory of 1088 3384 svchost.exe netsh.exe PID 3384 wrote to memory of 1088 3384 svchost.exe netsh.exe PID 3384 wrote to memory of 1088 3384 svchost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe"C:\Users\Admin\AppData\Local\Temp\71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\71078D7CF6428403D8E6298613B1D2932D16129A0E033.exeC:\Users\Admin\AppData\Local\Temp\71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe" "svchost.exe" ENABLE5⤵PID:1088
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\71078D7CF6428403D8E6298613B1D2932D16129A0E033.exe.log
MD57438b57da35c10c478469635b79e33e1
SHA15ffcbdfbfd800f67d6d9d6ee46de2eb13fcbb9a5
SHA256b253c066d4a6604aaa5204b09c1edde92c410b0af351f3760891f5e56c867f70
SHA5125887796f8ceb1c5ae790caff0020084df49ea8d613b78656a47dc9a569c5c86a9b16ec2ebe0d6f34c5e3001026385bb1282434cc3ffc7bda99427c154c04b45a
-
MD5
7438b57da35c10c478469635b79e33e1
SHA15ffcbdfbfd800f67d6d9d6ee46de2eb13fcbb9a5
SHA256b253c066d4a6604aaa5204b09c1edde92c410b0af351f3760891f5e56c867f70
SHA5125887796f8ceb1c5ae790caff0020084df49ea8d613b78656a47dc9a569c5c86a9b16ec2ebe0d6f34c5e3001026385bb1282434cc3ffc7bda99427c154c04b45a
-
MD5
9ba09fe66a6c0f30ccc1800487e14a33
SHA156a97a459acf4cd6403eaa174944f1d1db7957c6
SHA25671078d7cf6428403d8e6298613b1d2932d16129a0e033f0c008abd7fb194ba80
SHA51288679b1b788741d52c1a2d443fe4906231d1c7b7aa475bf1b22465d1e51001902f9d42aebc74680217cc69ecb79dbe1bad1e4962452b6416ae8071e6feb310b1
-
MD5
9ba09fe66a6c0f30ccc1800487e14a33
SHA156a97a459acf4cd6403eaa174944f1d1db7957c6
SHA25671078d7cf6428403d8e6298613b1d2932d16129a0e033f0c008abd7fb194ba80
SHA51288679b1b788741d52c1a2d443fe4906231d1c7b7aa475bf1b22465d1e51001902f9d42aebc74680217cc69ecb79dbe1bad1e4962452b6416ae8071e6feb310b1
-
MD5
9ba09fe66a6c0f30ccc1800487e14a33
SHA156a97a459acf4cd6403eaa174944f1d1db7957c6
SHA25671078d7cf6428403d8e6298613b1d2932d16129a0e033f0c008abd7fb194ba80
SHA51288679b1b788741d52c1a2d443fe4906231d1c7b7aa475bf1b22465d1e51001902f9d42aebc74680217cc69ecb79dbe1bad1e4962452b6416ae8071e6feb310b1