Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    02-12-2021 08:16

General

  • Target

    5a3f8432068137c850d17874273fd427.exe

  • Size

    31KB

  • MD5

    5a3f8432068137c850d17874273fd427

  • SHA1

    61c91d3c1a8f2af743431c593594e168e21e03c6

  • SHA256

    13958533a121d7d40e9b6c795e04f28a9bc66c29b713d0af780b66ecda3222b0

  • SHA512

    0baf77c8391a72ca0cf187d0101a9c8d0fefc5515153744830706b671412bfc0aafa077596b7911742c1b0b35efa01d666bd4389d2fffaf188d3b736eb0a04b5

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a3f8432068137c850d17874273fd427.exe
    "C:\Users\Admin\AppData\Local\Temp\5a3f8432068137c850d17874273fd427.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\5a3f8432068137c850d17874273fd427.exe" "5a3f8432068137c850d17874273fd427.exe" ENABLE
      2⤵
        PID:4488

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/768-115-0x0000000003020000-0x0000000003021000-memory.dmp

      Filesize

      4KB

    • memory/4488-116-0x0000000000000000-mapping.dmp