Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    07-11-2021 05:43

General

  • Target

    Discord Nitro Generator.exe

  • Size

    5.4MB

  • MD5

    036cf4e0867b7da5d61cca264d383aa7

  • SHA1

    0924c45b9b1eba4060fb67d809813042cde0cd06

  • SHA256

    03b9378b4ab9711d69a10151b1a82a88018d2f910a9111243f1abadfb6a8f7c5

  • SHA512

    e71415ab39f4237a30c3bb83a23aa5474b1d0e1fe424dfe9447d758481e6c1fdc1891a90ab957e47bd6ac9ce8a5c608bc7d518f84a711fef259fcc12b3e27bab

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

white monkey

C2

127.0.0.1:1177

Mutex

56af94ecf1deb5aa0dab576ea890f3e9

Attributes
  • reg_key

    56af94ecf1deb5aa0dab576ea890f3e9

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord Nitro Generator.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord Nitro Generator.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Users\Admin\AppData\Local\Temp\sys32.exe
      sys32.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Users\Admin\AppData\Local\Temp\setup..exe
        "C:\Users\Admin\AppData\Local\Temp\setup..exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
          "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe"
          4⤵
          • Executes dropped EXE
          PID:1332
      • C:\Users\Admin\AppData\Local\Temp\setup_.exe
        "C:\Users\Admin\AppData\Local\Temp\setup_.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1104

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • C:\Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • C:\Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • C:\Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • \Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • \Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • \Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • memory/588-74-0x0000000000540000-0x0000000000541000-memory.dmp
    Filesize

    4KB

  • memory/588-62-0x0000000000000000-mapping.dmp
  • memory/668-59-0x0000000076241000-0x0000000076243000-memory.dmp
    Filesize

    8KB

  • memory/668-57-0x0000000000000000-mapping.dmp
  • memory/1104-115-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-133-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-79-0x000000000239F000-0x00000000023A8000-memory.dmp
    Filesize

    36KB

  • memory/1104-81-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-80-0x0000000000400000-0x00000000008B6000-memory.dmp
    Filesize

    4.7MB

  • memory/1104-82-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-83-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-84-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-85-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-86-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-87-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-88-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-89-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-90-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-91-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-92-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-94-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-93-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-95-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-98-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-102-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-106-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-108-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-112-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-77-0x000000000239D000-0x000000000239E000-memory.dmp
    Filesize

    4KB

  • memory/1104-118-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-121-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-124-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-128-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-131-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-134-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-136-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-135-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-78-0x000000000239E000-0x000000000239F000-memory.dmp
    Filesize

    4KB

  • memory/1104-132-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-130-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-129-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-127-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-126-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-125-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-123-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-122-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-120-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-119-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-117-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-116-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-114-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-113-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-111-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-110-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-109-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-107-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-105-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-104-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-103-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-101-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-100-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-99-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-97-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-96-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-76-0x0000000002373000-0x0000000002396000-memory.dmp
    Filesize

    140KB

  • memory/1104-346-0x0000000076FF0000-0x0000000076FF1000-memory.dmp
    Filesize

    4KB

  • memory/1104-75-0x00000000022A1000-0x0000000002373000-memory.dmp
    Filesize

    840KB

  • memory/1104-66-0x0000000000000000-mapping.dmp
  • memory/1104-326-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/1104-345-0x00000000758E0000-0x00000000758E1000-memory.dmp
    Filesize

    4KB

  • memory/1332-327-0x0000000002010000-0x0000000002011000-memory.dmp
    Filesize

    4KB

  • memory/1332-322-0x0000000000000000-mapping.dmp