Analysis
-
max time kernel
151s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
21-11-2021 21:31
Behavioral task
behavioral1
Sample
C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe
Resource
win7-en-20211014
General
-
Target
C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe
-
Size
23KB
-
MD5
6f583b03795a6bb7f086446ee6b11b62
-
SHA1
5c7df1e74ee956641304e93ccd6766dd81277c07
-
SHA256
c68153ced490f150aaa321f8e017f5c04525bfc729f68d8400fba21d0dfb1387
-
SHA512
903a04fe11097e5f9bf3c81d37e16bdce0b5febf56b36704f26f827ad1ffd49975096078711fa433931bacf2a5f7fed13ddeab66c716953a1a139eee03723786
Malware Config
Extracted
njrat
0.7d
xButtoN
crlnegolamx.ddns.net:89
3b51fad99c0c53b7f1590d6f74c8fccb
-
reg_key
3b51fad99c0c53b7f1590d6f74c8fccb
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)
-
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)
-
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Get Passwords)
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Get Passwords)
-
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
-
Executes dropped EXE 1 IoCs
Processes:
tasksys.exepid process 3976 tasksys.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
tasksys.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3b51fad99c0c53b7f1590d6f74c8fccb.exe tasksys.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3b51fad99c0c53b7f1590d6f74c8fccb.exe tasksys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tasksys.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\3b51fad99c0c53b7f1590d6f74c8fccb = "\"C:\\Users\\Admin\\AppData\\Roaming\\tasksys.exe\" .." tasksys.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\3b51fad99c0c53b7f1590d6f74c8fccb = "\"C:\\Users\\Admin\\AppData\\Roaming\\tasksys.exe\" .." tasksys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
tasksys.exedescription pid process Token: SeDebugPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe Token: 33 3976 tasksys.exe Token: SeIncBasePriorityPrivilege 3976 tasksys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
C68153CED490F150AAA321F8E017F5C04525BFC729F68.exetasksys.exedescription pid process target process PID 3064 wrote to memory of 3976 3064 C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe tasksys.exe PID 3064 wrote to memory of 3976 3064 C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe tasksys.exe PID 3064 wrote to memory of 3976 3064 C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe tasksys.exe PID 3976 wrote to memory of 3524 3976 tasksys.exe netsh.exe PID 3976 wrote to memory of 3524 3976 tasksys.exe netsh.exe PID 3976 wrote to memory of 3524 3976 tasksys.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe"C:\Users\Admin\AppData\Local\Temp\C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\tasksys.exe"C:\Users\Admin\AppData\Roaming\tasksys.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\tasksys.exe" "tasksys.exe" ENABLE3⤵PID:3524
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6f583b03795a6bb7f086446ee6b11b62
SHA15c7df1e74ee956641304e93ccd6766dd81277c07
SHA256c68153ced490f150aaa321f8e017f5c04525bfc729f68d8400fba21d0dfb1387
SHA512903a04fe11097e5f9bf3c81d37e16bdce0b5febf56b36704f26f827ad1ffd49975096078711fa433931bacf2a5f7fed13ddeab66c716953a1a139eee03723786
-
MD5
6f583b03795a6bb7f086446ee6b11b62
SHA15c7df1e74ee956641304e93ccd6766dd81277c07
SHA256c68153ced490f150aaa321f8e017f5c04525bfc729f68d8400fba21d0dfb1387
SHA512903a04fe11097e5f9bf3c81d37e16bdce0b5febf56b36704f26f827ad1ffd49975096078711fa433931bacf2a5f7fed13ddeab66c716953a1a139eee03723786