Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    07-11-2021 01:49

General

  • Target

    D3A9543FAE305405220AC1F627327074DC1BDE573789452A2F0E62429DB87987.exe

  • Size

    1.3MB

  • MD5

    ec7f6620c82becd13651a358f408bf72

  • SHA1

    d66e726b99a648f705a8ab82308c52cad9ca275d

  • SHA256

    d3a9543fae305405220ac1f627327074dc1bde573789452a2f0e62429db87987

  • SHA512

    1efc9ab3bf16f434c67d6904ecae70ec3d9811958d758401672a6c062f3f4fc8627049cb884cee0e5b8dd40946d14e96716f4bd8c1210373df49a4533e1f5d4d

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

alice2019.myftp.biz:5552

Mutex

28ac71370f2e4

Attributes
  • reg_key

    28ac71370f2e4

  • splitter

    @!#&^%$

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • autoit_exe 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D3A9543FAE305405220AC1F627327074DC1BDE573789452A2F0E62429DB87987.exe
    "C:\Users\Admin\AppData\Local\Temp\D3A9543FAE305405220AC1F627327074DC1BDE573789452A2F0E62429DB87987.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Program Files (x86)\Company\NewProduct\Topaz Gigapixel AI.exe
      "C:\Program Files (x86)\Company\NewProduct\Topaz Gigapixel AI.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:3924
    • C:\Users\Admin\AppData\Roaming\sdff.exe
      "C:\Users\Admin\AppData\Roaming\sdff.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\52830064\xwobhs.pif
        "C:\52830064\xwobhs.pif" aqkwbthvr.ikb
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:404
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1572
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2768

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\52830064\aqkwbthvr.ikb
      MD5

      1f4c7f94e81f5676cac726fa32a4267b

      SHA1

      916104ff346ab10620f0926c241cf248d4b25b90

      SHA256

      cc535eaa9283d61eda11015e006ae054ccd331a70ad96baeccad61f22efa624b

      SHA512

      006f7ae411969c304b492e733cfcee22de4aca0d07873a95cbb0195f3d322697acd20e3c4c53e67f2db8388ed6b089b634e5bbdd3406619b0ec40ad77ca93841

    • C:\52830064\brvhbiro.bin
      MD5

      34dc4be1960b4ac6aaff64726d0af2ec

      SHA1

      1fdf27bacfb1b6134c4c08773374485855ece15b

      SHA256

      2f2ac6f0e36134f2166e0232b64637dc7f2e33812d38e577f8c944b3f87edcda

      SHA512

      2d441101e828a9766be8df35ae923c0a16fa2b690b40bef6f0a27a22b2061bf53571aa09e35fc93af3e2e2df214f14dac7e73b14e86c59b9dfd1e0cb642e5eff

    • C:\52830064\xwobhs.pif
      MD5

      957fcff5374f7a5ee128d32c976adaa5

      SHA1

      72a4cc77337d22b5c23335538c62bea7ed9cbb93

      SHA256

      699534a988a6aa7c8c5ff4eb01ac28292be257b0312e6d7351fb4cacaa4124d5

      SHA512

      e9dc65fbb964cb64cfcbb1c9b5c53595b0f0304a7179710ddac5aefa2f0f40bb67271b7aeb39654254c2fe68fcd62b77a94674b8e9c3a57ad3497197ede87ca9

    • C:\52830064\xwobhs.pif
      MD5

      957fcff5374f7a5ee128d32c976adaa5

      SHA1

      72a4cc77337d22b5c23335538c62bea7ed9cbb93

      SHA256

      699534a988a6aa7c8c5ff4eb01ac28292be257b0312e6d7351fb4cacaa4124d5

      SHA512

      e9dc65fbb964cb64cfcbb1c9b5c53595b0f0304a7179710ddac5aefa2f0f40bb67271b7aeb39654254c2fe68fcd62b77a94674b8e9c3a57ad3497197ede87ca9

    • C:\Program Files (x86)\Company\NewProduct\Topaz Gigapixel AI.exe
      MD5

      9abc52b7dc79d4641d7a2773d9bd6999

      SHA1

      7fb26b7ae31e80a6aad297c3191ec175dfc23142

      SHA256

      eeb84edf9569c645b112a1f7d75f608d2dc54ddb66e63d1d0327b761f3eb85fd

      SHA512

      7a9f5b5eceecc1ac4090f3324e9533f7eec5bffee63c626e0f09f50e800f10308e0cf4ce1ca3e8e0ad6c75fdd8914d5d4ba2afc32d6992d38c83fe9a672b2de4

    • C:\Program Files (x86)\Company\NewProduct\Topaz Gigapixel AI.exe
      MD5

      9abc52b7dc79d4641d7a2773d9bd6999

      SHA1

      7fb26b7ae31e80a6aad297c3191ec175dfc23142

      SHA256

      eeb84edf9569c645b112a1f7d75f608d2dc54ddb66e63d1d0327b761f3eb85fd

      SHA512

      7a9f5b5eceecc1ac4090f3324e9533f7eec5bffee63c626e0f09f50e800f10308e0cf4ce1ca3e8e0ad6c75fdd8914d5d4ba2afc32d6992d38c83fe9a672b2de4

    • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
      MD5

      0e06054beb13192588e745ee63a84173

      SHA1

      30b7d4d1277bafd04a83779fd566a1f834a8d113

      SHA256

      c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

      SHA512

      251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

    • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
      MD5

      0e06054beb13192588e745ee63a84173

      SHA1

      30b7d4d1277bafd04a83779fd566a1f834a8d113

      SHA256

      c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

      SHA512

      251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

    • C:\Users\Admin\AppData\Roaming\sdff.exe
      MD5

      de3d6958f101e3b252f18168f240480d

      SHA1

      4a2ff6b9018df0b31db61ce4f5a6d844c05dc3ce

      SHA256

      1e73294675f42df94d101ece8c550fcfa2746ae6f8bf3261e16d315c5d8de832

      SHA512

      ca26091630e7509e79b386cbc1024446d51bc1ff0763b14aa1e8d03b0ec815d2484beccc905d1694db87a5b1dc8a8e95971c25dd5cd51abe9cbd000aea13f1f7

    • C:\Users\Admin\AppData\Roaming\sdff.exe
      MD5

      de3d6958f101e3b252f18168f240480d

      SHA1

      4a2ff6b9018df0b31db61ce4f5a6d844c05dc3ce

      SHA256

      1e73294675f42df94d101ece8c550fcfa2746ae6f8bf3261e16d315c5d8de832

      SHA512

      ca26091630e7509e79b386cbc1024446d51bc1ff0763b14aa1e8d03b0ec815d2484beccc905d1694db87a5b1dc8a8e95971c25dd5cd51abe9cbd000aea13f1f7

    • memory/404-124-0x0000000000000000-mapping.dmp
    • memory/1572-129-0x0000000001100000-0x00000000015C2000-memory.dmp
      Filesize

      4.8MB

    • memory/1572-130-0x000000000110676E-mapping.dmp
    • memory/1572-135-0x0000000005BB0000-0x0000000005BB1000-memory.dmp
      Filesize

      4KB

    • memory/1572-136-0x0000000006170000-0x0000000006171000-memory.dmp
      Filesize

      4KB

    • memory/1572-137-0x0000000005E10000-0x0000000005E11000-memory.dmp
      Filesize

      4KB

    • memory/1572-138-0x0000000005B10000-0x0000000005BAC000-memory.dmp
      Filesize

      624KB

    • memory/1572-139-0x0000000005D90000-0x0000000005D91000-memory.dmp
      Filesize

      4KB

    • memory/1572-140-0x0000000005FE0000-0x0000000005FE1000-memory.dmp
      Filesize

      4KB

    • memory/3144-121-0x0000000000000000-mapping.dmp
    • memory/3924-118-0x0000000000000000-mapping.dmp