Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    11-11-2021 23:05

General

  • Target

    Twitter Hacking Tool.exe

  • Size

    5.4MB

  • MD5

    c17a1a08f40029c5134c7dfee8855c62

  • SHA1

    aeddeda74af8d0645090be751a8f1a9a389a7fa9

  • SHA256

    6d03ac7f036581531299dec4e1dd380bf19e17b88dcf43dcc5a6eae62ab87a6c

  • SHA512

    b27076e68926b751c3496eb7fb029a0840ca9d630d1b27c6f329cbad789b0c89d2c5453ff519ef165d9cf99a0f2e57905fe08d290084f9d10559d58090bc57d3

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

white monkey

C2

127.0.0.1:1177

Mutex

56af94ecf1deb5aa0dab576ea890f3e9

Attributes
  • reg_key

    56af94ecf1deb5aa0dab576ea890f3e9

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Twitter Hacking Tool.exe
    "C:\Users\Admin\AppData\Local\Temp\Twitter Hacking Tool.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\sys32.exe
      sys32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\setup..exe
        "C:\Users\Admin\AppData\Local\Temp\setup..exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
          "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3380
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\nordvpn.exe" "nordvpn.exe" ENABLE
            5⤵
              PID:904
        • C:\Users\Admin\AppData\Local\Temp\setup_.exe
          "C:\Users\Admin\AppData\Local\Temp\setup_.exe"
          3⤵
          • Executes dropped EXE
          PID:584
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 720
            4⤵
            • Program crash
            PID:3164

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\nordvpn.exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\setup..exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\setup..exe
      MD5

      4691c91f1abaccef0f5dfafc85942310

      SHA1

      3c9c8c03501988bb2bb964db3d60a77062ef92a1

      SHA256

      9e9ce667ebfdb6605bbcc4233309cae2c98abc46e2653be5b20c0f703dad7224

      SHA512

      a836fd3b649b3fe2e9987e3bd8f5f669020549fa78142b7377d5e56e030d36c59a2e6eb6a08e46e3b50da79981bd23fbb889502f3be087448c6f0db254b7b574

    • C:\Users\Admin\AppData\Local\Temp\setup_.exe
      MD5

      1cd5240426985eb0e32e10606334c8ea

      SHA1

      f645cb1538ad0e8df89ac64210306e6862b108ed

      SHA256

      ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

      SHA512

      6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

    • C:\Users\Admin\AppData\Local\Temp\setup_.exe
      MD5

      1cd5240426985eb0e32e10606334c8ea

      SHA1

      f645cb1538ad0e8df89ac64210306e6862b108ed

      SHA256

      ab9818436dc89b24355524393bfdbe3878b6496d5660b91228cc6d1d9df181c0

      SHA512

      6e5577794646adf86815010c2fcd4b0b60a3edc4fab315c42eb0500e60a99da36d04036b43a69df55bb7702b833f2f92997c63a97bccca10263c5adc06c6a368

    • C:\Users\Admin\AppData\Local\Temp\sys32.exe
      MD5

      937c4ed05a3ecd221b5fed516392249c

      SHA1

      72f591422a654febc2dbf92922dc85e91da65fa7

      SHA256

      bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

      SHA512

      14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

    • C:\Users\Admin\AppData\Local\Temp\sys32.exe
      MD5

      937c4ed05a3ecd221b5fed516392249c

      SHA1

      72f591422a654febc2dbf92922dc85e91da65fa7

      SHA256

      bc735af90ec655fb686eeb2e23ea089c744e441c40543a518875eeb9d58d9361

      SHA512

      14b9d81045b0dba1bfc776f727a2a96a851d89a9a5e7c9b8234771956b442ef70d86480962f4d2e78baa52f1c3cf2645a4030eccdb834a5872633882c5c4627b

    • memory/584-161-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-379-0x00000000008C0000-0x000000000096E000-memory.dmp
      Filesize

      696KB

    • memory/584-130-0x00000000025DE000-0x00000000025DF000-memory.dmp
      Filesize

      4KB

    • memory/584-131-0x00000000025DF000-0x00000000025E8000-memory.dmp
      Filesize

      36KB

    • memory/584-132-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-133-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-135-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-136-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-134-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-137-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-138-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-139-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-140-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-141-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-142-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-143-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-144-0x0000000000400000-0x00000000008B6000-memory.dmp
      Filesize

      4.7MB

    • memory/584-145-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-147-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-148-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-149-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-150-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-151-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-152-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-382-0x0000000076940000-0x0000000076941000-memory.dmp
      Filesize

      4KB

    • memory/584-381-0x0000000076700000-0x0000000076701000-memory.dmp
      Filesize

      4KB

    • memory/584-153-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-154-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-155-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-156-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-157-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-159-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-158-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-160-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-128-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-162-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-175-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-129-0x00000000025DD000-0x00000000025DE000-memory.dmp
      Filesize

      4KB

    • memory/584-191-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-166-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-167-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-168-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-170-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-169-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-172-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-173-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-171-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-174-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-163-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-176-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-178-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-179-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-180-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-181-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-182-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-177-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-183-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-184-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-185-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-186-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-187-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-188-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-189-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-190-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-165-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-192-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-164-0x00000000025B3000-0x00000000025D6000-memory.dmp
      Filesize

      140KB

    • memory/584-124-0x0000000000000000-mapping.dmp
    • memory/584-127-0x00000000024E1000-0x00000000025B3000-memory.dmp
      Filesize

      840KB

    • memory/904-227-0x0000000000000000-mapping.dmp
    • memory/1256-146-0x0000000000DC0000-0x0000000000DC1000-memory.dmp
      Filesize

      4KB

    • memory/1256-121-0x0000000000000000-mapping.dmp
    • memory/2584-118-0x0000000000000000-mapping.dmp
    • memory/3380-215-0x0000000000000000-mapping.dmp
    • memory/3380-250-0x0000000002AC0000-0x0000000002AC1000-memory.dmp
      Filesize

      4KB

    • memory/3380-383-0x0000000002AC3000-0x0000000002AC5000-memory.dmp
      Filesize

      8KB