Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    11-11-2021 23:05

General

  • Target

    Twitter Hacking Tool.exe

  • Size

    5.4MB

  • MD5

    c17a1a08f40029c5134c7dfee8855c62

  • SHA1

    aeddeda74af8d0645090be751a8f1a9a389a7fa9

  • SHA256

    6d03ac7f036581531299dec4e1dd380bf19e17b88dcf43dcc5a6eae62ab87a6c

  • SHA512

    b27076e68926b751c3496eb7fb029a0840ca9d630d1b27c6f329cbad789b0c89d2c5453ff519ef165d9cf99a0f2e57905fe08d290084f9d10559d58090bc57d3

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

white monkey

C2

127.0.0.1:1177

Mutex

56af94ecf1deb5aa0dab576ea890f3e9

Attributes
  • reg_key

    56af94ecf1deb5aa0dab576ea890f3e9

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Twitter Hacking Tool.exe
    "C:\Users\Admin\AppData\Local\Temp\Twitter Hacking Tool.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Users\Admin\AppData\Local\Temp\sys32.exe
      sys32.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Users\Admin\AppData\Local\Temp\setup..exe
        "C:\Users\Admin\AppData\Local\Temp\setup..exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
          "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe"
          4⤵
          • Executes dropped EXE
          PID:296
      • C:\Users\Admin\AppData\Local\Temp\setup_.exe
        "C:\Users\Admin\AppData\Local\Temp\setup_.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:432

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • C:\Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • C:\Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • C:\Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • C:\Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • \Users\Admin\AppData\Local\Temp\nordvpn.exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • \Users\Admin\AppData\Local\Temp\setup..exe
    MD5

    4691c91f1abaccef0f5dfafc85942310

    SHA1

    3c9c8c03501988bb2bb964db3d60a77062ef92a1

    SHA256

    9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

    SHA512

    a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\setup_.exe
    MD5

    1cd5240426985eb0e32e10606334c8ea

    SHA1

    f645cb1538ad0e8df89ac64210306e6862b108ed

    SHA256

    ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

    SHA512

    6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

  • \Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • \Users\Admin\AppData\Local\Temp\sys32.exe
    MD5

    937c4ed05a3ecd221b5fed516392249c

    SHA1

    72f591422a654febc2dbf92922dc85e91da65fa7

    SHA256

    bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

    SHA512

    14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

  • memory/296-297-0x0000000000620000-0x0000000000621000-memory.dmp
    Filesize

    4KB

  • memory/296-128-0x0000000000000000-mapping.dmp
  • memory/432-123-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-130-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-90-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-93-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-97-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-100-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-103-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-104-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-102-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-101-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-99-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-105-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-106-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-110-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-112-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-115-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-117-0x0000000000400000-0x00000000008B6000-memory.dmp
    Filesize

    4.7MB

  • memory/432-116-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-119-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-118-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-120-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-114-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-121-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-122-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-84-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-124-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-113-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-125-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-80-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-129-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-75-0x0000000000E81000-0x0000000000F53000-memory.dmp
    Filesize

    840KB

  • memory/432-134-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-135-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-346-0x00000000771C0000-0x00000000771C1000-memory.dmp
    Filesize

    4KB

  • memory/432-136-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-87-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-127-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-344-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/432-111-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-109-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-137-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-108-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-107-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-138-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-98-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-96-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-95-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-94-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-92-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-91-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-89-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-88-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-139-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-140-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-86-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-85-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-83-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-82-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-81-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-79-0x0000000000F7F000-0x0000000000F88000-memory.dmp
    Filesize

    36KB

  • memory/432-78-0x0000000000F7E000-0x0000000000F7F000-memory.dmp
    Filesize

    4KB

  • memory/432-77-0x0000000000F7D000-0x0000000000F7E000-memory.dmp
    Filesize

    4KB

  • memory/432-76-0x0000000000F53000-0x0000000000F76000-memory.dmp
    Filesize

    140KB

  • memory/432-66-0x0000000000000000-mapping.dmp
  • memory/432-345-0x0000000076C90000-0x0000000076C91000-memory.dmp
    Filesize

    4KB

  • memory/1456-62-0x0000000000000000-mapping.dmp
  • memory/1456-71-0x00000000006E0000-0x00000000006E1000-memory.dmp
    Filesize

    4KB

  • memory/1464-57-0x0000000000000000-mapping.dmp
  • memory/1464-59-0x00000000758C1000-0x00000000758C3000-memory.dmp
    Filesize

    8KB