Analysis

  • max time kernel
    151s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    21-11-2021 21:31

General

  • Target

    C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe

  • Size

    23KB

  • MD5

    6f583b03795a6bb7f086446ee6b11b62

  • SHA1

    5c7df1e74ee956641304e93ccd6766dd81277c07

  • SHA256

    c68153ced490f150aaa321f8e017f5c04525bfc729f68d8400fba21d0dfb1387

  • SHA512

    903a04fe11097e5f9bf3c81d37e16bdce0b5febf56b36704f26f827ad1ffd49975096078711fa433931bacf2a5f7fed13ddeab66c716953a1a139eee03723786

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

xButtoN

C2

crlnegolamx.ddns.net:89

Mutex

3b51fad99c0c53b7f1590d6f74c8fccb

Attributes
  • reg_key

    3b51fad99c0c53b7f1590d6f74c8fccb

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Get Passwords)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Get Passwords)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe
    "C:\Users\Admin\AppData\Local\Temp\C68153CED490F150AAA321F8E017F5C04525BFC729F68.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Roaming\tasksys.exe
      "C:\Users\Admin\AppData\Roaming\tasksys.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\tasksys.exe" "tasksys.exe" ENABLE
        3⤵
          PID:3524

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\tasksys.exe

      MD5

      6f583b03795a6bb7f086446ee6b11b62

      SHA1

      5c7df1e74ee956641304e93ccd6766dd81277c07

      SHA256

      c68153ced490f150aaa321f8e017f5c04525bfc729f68d8400fba21d0dfb1387

      SHA512

      903a04fe11097e5f9bf3c81d37e16bdce0b5febf56b36704f26f827ad1ffd49975096078711fa433931bacf2a5f7fed13ddeab66c716953a1a139eee03723786

    • C:\Users\Admin\AppData\Roaming\tasksys.exe

      MD5

      6f583b03795a6bb7f086446ee6b11b62

      SHA1

      5c7df1e74ee956641304e93ccd6766dd81277c07

      SHA256

      c68153ced490f150aaa321f8e017f5c04525bfc729f68d8400fba21d0dfb1387

      SHA512

      903a04fe11097e5f9bf3c81d37e16bdce0b5febf56b36704f26f827ad1ffd49975096078711fa433931bacf2a5f7fed13ddeab66c716953a1a139eee03723786

    • memory/3064-118-0x0000000001060000-0x00000000011AA000-memory.dmp

      Filesize

      1.3MB

    • memory/3524-123-0x0000000000000000-mapping.dmp

    • memory/3976-119-0x0000000000000000-mapping.dmp

    • memory/3976-122-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

      Filesize

      4KB

    • memory/3976-124-0x0000000000EB1000-0x0000000000EB2000-memory.dmp

      Filesize

      4KB