Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
14-11-2021 18:12
Behavioral task
behavioral1
Sample
db404d344d12678f7213b44048818c17.exe
Resource
win7-en-20211104
General
-
Target
db404d344d12678f7213b44048818c17.exe
-
Size
37KB
-
MD5
db404d344d12678f7213b44048818c17
-
SHA1
7772297858581e8baa9b1546e8dd06fd255f0219
-
SHA256
8c4909cf7dc12e6724f7cbb4f095d366237a93ce25c6eedde1ff435aba588c68
-
SHA512
0f674d3af53ba86bacec2ab25da57887fac0f490a95e5b60e2bad99f31e8bc5f7a98105ab3ae532e6b3852657d79630d0b67bc3d5f87326cdb3e8ad91cfce8ad
Malware Config
Extracted
njrat
im523
HacKed
efficient-oil.auto.playit.gg:55457
b5058363d72546b0d0159499b17dedd9
-
reg_key
b5058363d72546b0d0159499b17dedd9
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 1248 server.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
server.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b5058363d72546b0d0159499b17dedd9.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b5058363d72546b0d0159499b17dedd9.exe server.exe -
Loads dropped DLL 1 IoCs
Processes:
db404d344d12678f7213b44048818c17.exepid process 1648 db404d344d12678f7213b44048818c17.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
server.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\b5058363d72546b0d0159499b17dedd9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\b5058363d72546b0d0159499b17dedd9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
server.exedescription pid process Token: SeDebugPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe Token: 33 1248 server.exe Token: SeIncBasePriorityPrivilege 1248 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
db404d344d12678f7213b44048818c17.exeserver.exedescription pid process target process PID 1648 wrote to memory of 1248 1648 db404d344d12678f7213b44048818c17.exe server.exe PID 1648 wrote to memory of 1248 1648 db404d344d12678f7213b44048818c17.exe server.exe PID 1648 wrote to memory of 1248 1648 db404d344d12678f7213b44048818c17.exe server.exe PID 1648 wrote to memory of 1248 1648 db404d344d12678f7213b44048818c17.exe server.exe PID 1248 wrote to memory of 108 1248 server.exe netsh.exe PID 1248 wrote to memory of 108 1248 server.exe netsh.exe PID 1248 wrote to memory of 108 1248 server.exe netsh.exe PID 1248 wrote to memory of 108 1248 server.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db404d344d12678f7213b44048818c17.exe"C:\Users\Admin\AppData\Local\Temp\db404d344d12678f7213b44048818c17.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\server.exeMD5
db404d344d12678f7213b44048818c17
SHA17772297858581e8baa9b1546e8dd06fd255f0219
SHA2568c4909cf7dc12e6724f7cbb4f095d366237a93ce25c6eedde1ff435aba588c68
SHA5120f674d3af53ba86bacec2ab25da57887fac0f490a95e5b60e2bad99f31e8bc5f7a98105ab3ae532e6b3852657d79630d0b67bc3d5f87326cdb3e8ad91cfce8ad
-
C:\Users\Admin\AppData\Local\Temp\server.exeMD5
db404d344d12678f7213b44048818c17
SHA17772297858581e8baa9b1546e8dd06fd255f0219
SHA2568c4909cf7dc12e6724f7cbb4f095d366237a93ce25c6eedde1ff435aba588c68
SHA5120f674d3af53ba86bacec2ab25da57887fac0f490a95e5b60e2bad99f31e8bc5f7a98105ab3ae532e6b3852657d79630d0b67bc3d5f87326cdb3e8ad91cfce8ad
-
\Users\Admin\AppData\Local\Temp\server.exeMD5
db404d344d12678f7213b44048818c17
SHA17772297858581e8baa9b1546e8dd06fd255f0219
SHA2568c4909cf7dc12e6724f7cbb4f095d366237a93ce25c6eedde1ff435aba588c68
SHA5120f674d3af53ba86bacec2ab25da57887fac0f490a95e5b60e2bad99f31e8bc5f7a98105ab3ae532e6b3852657d79630d0b67bc3d5f87326cdb3e8ad91cfce8ad
-
memory/108-63-0x0000000000000000-mapping.dmp
-
memory/1248-58-0x0000000000000000-mapping.dmp
-
memory/1248-62-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/1648-55-0x0000000075491000-0x0000000075493000-memory.dmpFilesize
8KB
-
memory/1648-56-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB