Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
02-12-2021 08:16
Behavioral task
behavioral1
Sample
5a3f8432068137c850d17874273fd427.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5a3f8432068137c850d17874273fd427.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
5a3f8432068137c850d17874273fd427.exe
-
Size
31KB
-
MD5
5a3f8432068137c850d17874273fd427
-
SHA1
61c91d3c1a8f2af743431c593594e168e21e03c6
-
SHA256
13958533a121d7d40e9b6c795e04f28a9bc66c29b713d0af780b66ecda3222b0
-
SHA512
0baf77c8391a72ca0cf187d0101a9c8d0fefc5515153744830706b671412bfc0aafa077596b7911742c1b0b35efa01d666bd4389d2fffaf188d3b736eb0a04b5
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
5a3f8432068137c850d17874273fd427.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e83433789b9bce5c55182b1ac13312d8.exe 5a3f8432068137c850d17874273fd427.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e83433789b9bce5c55182b1ac13312d8.exe 5a3f8432068137c850d17874273fd427.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5a3f8432068137c850d17874273fd427.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\e83433789b9bce5c55182b1ac13312d8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\5a3f8432068137c850d17874273fd427.exe\" .." 5a3f8432068137c850d17874273fd427.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\e83433789b9bce5c55182b1ac13312d8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\5a3f8432068137c850d17874273fd427.exe\" .." 5a3f8432068137c850d17874273fd427.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
5a3f8432068137c850d17874273fd427.exedescription pid process Token: SeDebugPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe Token: 33 1616 5a3f8432068137c850d17874273fd427.exe Token: SeIncBasePriorityPrivilege 1616 5a3f8432068137c850d17874273fd427.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5a3f8432068137c850d17874273fd427.exedescription pid process target process PID 1616 wrote to memory of 1712 1616 5a3f8432068137c850d17874273fd427.exe netsh.exe PID 1616 wrote to memory of 1712 1616 5a3f8432068137c850d17874273fd427.exe netsh.exe PID 1616 wrote to memory of 1712 1616 5a3f8432068137c850d17874273fd427.exe netsh.exe PID 1616 wrote to memory of 1712 1616 5a3f8432068137c850d17874273fd427.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a3f8432068137c850d17874273fd427.exe"C:\Users\Admin\AppData\Local\Temp\5a3f8432068137c850d17874273fd427.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\5a3f8432068137c850d17874273fd427.exe" "5a3f8432068137c850d17874273fd427.exe" ENABLE2⤵PID:1712