Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
11-11-2021 23:05
Static task
static1
Behavioral task
behavioral1
Sample
Twitter Hacking Tool.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Twitter Hacking Tool.exe
Resource
win10-en-20211104
General
-
Target
Twitter Hacking Tool.exe
-
Size
5.4MB
-
MD5
c17a1a08f40029c5134c7dfee8855c62
-
SHA1
aeddeda74af8d0645090be751a8f1a9a389a7fa9
-
SHA256
6d03ac7f036581531299dec4e1dd380bf19e17b88dcf43dcc5a6eae62ab87a6c
-
SHA512
b27076e68926b751c3496eb7fb029a0840ca9d630d1b27c6f329cbad789b0c89d2c5453ff519ef165d9cf99a0f2e57905fe08d290084f9d10559d58090bc57d3
Malware Config
Extracted
njrat
0.6.4
white monkey
127.0.0.1:1177
56af94ecf1deb5aa0dab576ea890f3e9
-
reg_key
56af94ecf1deb5aa0dab576ea890f3e9
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
sys32.exesetup..exesetup_.exenordvpn.exepid process 2584 sys32.exe 1256 setup..exe 584 setup_.exe 3380 nordvpn.exe -
Modifies Windows Firewall 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
nordvpn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\56af94ecf1deb5aa0dab576ea890f3e9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\nordvpn.exe\" .." nordvpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\56af94ecf1deb5aa0dab576ea890f3e9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\nordvpn.exe\" .." nordvpn.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 api.ipify.org 12 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3164 584 WerFault.exe setup_.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 14 Go-http-client/1.1 -
Processes:
Twitter Hacking Tool.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Twitter Hacking Tool.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Twitter Hacking Tool.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Twitter Hacking Tool.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
nordvpn.exepid process 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe 3380 nordvpn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nordvpn.exedescription pid process Token: SeDebugPrivilege 3380 nordvpn.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Twitter Hacking Tool.exesys32.exesetup..exenordvpn.exedescription pid process target process PID 2572 wrote to memory of 2584 2572 Twitter Hacking Tool.exe sys32.exe PID 2572 wrote to memory of 2584 2572 Twitter Hacking Tool.exe sys32.exe PID 2572 wrote to memory of 2584 2572 Twitter Hacking Tool.exe sys32.exe PID 2584 wrote to memory of 1256 2584 sys32.exe setup..exe PID 2584 wrote to memory of 1256 2584 sys32.exe setup..exe PID 2584 wrote to memory of 1256 2584 sys32.exe setup..exe PID 2584 wrote to memory of 584 2584 sys32.exe setup_.exe PID 2584 wrote to memory of 584 2584 sys32.exe setup_.exe PID 2584 wrote to memory of 584 2584 sys32.exe setup_.exe PID 1256 wrote to memory of 3380 1256 setup..exe nordvpn.exe PID 1256 wrote to memory of 3380 1256 setup..exe nordvpn.exe PID 1256 wrote to memory of 3380 1256 setup..exe nordvpn.exe PID 3380 wrote to memory of 904 3380 nordvpn.exe netsh.exe PID 3380 wrote to memory of 904 3380 nordvpn.exe netsh.exe PID 3380 wrote to memory of 904 3380 nordvpn.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Twitter Hacking Tool.exe"C:\Users\Admin\AppData\Local\Temp\Twitter Hacking Tool.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sys32.exesys32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup..exe"C:\Users\Admin\AppData\Local\Temp\setup..exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nordvpn.exe"C:\Users\Admin\AppData\Local\Temp\nordvpn.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe" "nordvpn.exe" ENABLE5⤵
-
C:\Users\Admin\AppData\Local\Temp\setup_.exe"C:\Users\Admin\AppData\Local\Temp\setup_.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 7204⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nordvpn.exeMD5
4691c91f1abaccef0f5dfafc85942310
SHA13c9c8c03501988bb2bb964db3d60a77062ef92a1
SHA2569e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224
SHA512a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574
-
C:\Users\Admin\AppData\Local\Temp\nordvpn.exeMD5
4691c91f1abaccef0f5dfafc85942310
SHA13c9c8c03501988bb2bb964db3d60a77062ef92a1
SHA2569e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224
SHA512a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574
-
C:\Users\Admin\AppData\Local\Temp\setup..exeMD5
4691c91f1abaccef0f5dfafc85942310
SHA13c9c8c03501988bb2bb964db3d60a77062ef92a1
SHA2569e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224
SHA512a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574
-
C:\Users\Admin\AppData\Local\Temp\setup..exeMD5
4691c91f1abaccef0f5dfafc85942310
SHA13c9c8c03501988bb2bb964db3d60a77062ef92a1
SHA2569e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224
SHA512a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574
-
C:\Users\Admin\AppData\Local\Temp\setup_.exeMD5
1cd5240426985eb0e32e10606334c8ea
SHA1f645cb1538ad0e8df89ac64210306e6862b108ed
SHA256ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0
SHA5126e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368
-
C:\Users\Admin\AppData\Local\Temp\setup_.exeMD5
1cd5240426985eb0e32e10606334c8ea
SHA1f645cb1538ad0e8df89ac64210306e6862b108ed
SHA256ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0
SHA5126e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368
-
C:\Users\Admin\AppData\Local\Temp\sys32.exeMD5
937c4ed05a3ecd221b5fed516392249c
SHA172f591422a654febc2dbf92922dc85e91da65fa7
SHA256bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361
SHA51214b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b
-
C:\Users\Admin\AppData\Local\Temp\sys32.exeMD5
937c4ed05a3ecd221b5fed516392249c
SHA172f591422a654febc2dbf92922dc85e91da65fa7
SHA256bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361
SHA51214b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b
-
memory/584-161-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-379-0x00000000008C0000-0x000000000096E000-memory.dmpFilesize
696KB
-
memory/584-130-0x00000000025DE000-0x00000000025DF000-memory.dmpFilesize
4KB
-
memory/584-131-0x00000000025DF000-0x00000000025E8000-memory.dmpFilesize
36KB
-
memory/584-132-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-133-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-135-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-136-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-134-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-137-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-138-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-139-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-140-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-141-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-142-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-143-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-144-0x0000000000400000-0x00000000008B6000-memory.dmpFilesize
4.7MB
-
memory/584-145-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-147-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-148-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-149-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-150-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-151-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-152-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-382-0x0000000076940000-0x0000000076941000-memory.dmpFilesize
4KB
-
memory/584-381-0x0000000076700000-0x0000000076701000-memory.dmpFilesize
4KB
-
memory/584-153-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-154-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-155-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-156-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-157-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-159-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-158-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-160-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-128-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-162-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-175-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-129-0x00000000025DD000-0x00000000025DE000-memory.dmpFilesize
4KB
-
memory/584-191-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-166-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-167-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-168-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-170-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-169-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-172-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-173-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-171-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-174-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-163-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-176-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-178-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-179-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-180-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-181-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-182-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-177-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-183-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-184-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-185-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-186-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-187-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-188-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-189-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-190-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-165-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-192-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-164-0x00000000025B3000-0x00000000025D6000-memory.dmpFilesize
140KB
-
memory/584-124-0x0000000000000000-mapping.dmp
-
memory/584-127-0x00000000024E1000-0x00000000025B3000-memory.dmpFilesize
840KB
-
memory/904-227-0x0000000000000000-mapping.dmp
-
memory/1256-146-0x0000000000DC0000-0x0000000000DC1000-memory.dmpFilesize
4KB
-
memory/1256-121-0x0000000000000000-mapping.dmp
-
memory/2584-118-0x0000000000000000-mapping.dmp
-
memory/3380-215-0x0000000000000000-mapping.dmp
-
memory/3380-250-0x0000000002AC0000-0x0000000002AC1000-memory.dmpFilesize
4KB
-
memory/3380-383-0x0000000002AC3000-0x0000000002AC5000-memory.dmpFilesize
8KB