Analysis
-
max time kernel
157s -
max time network
162s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
02-12-2021 09:07
Behavioral task
behavioral1
Sample
18f1f44a28639057e66f8390d4faa3df.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
18f1f44a28639057e66f8390d4faa3df.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
18f1f44a28639057e66f8390d4faa3df.exe
-
Size
31KB
-
MD5
18f1f44a28639057e66f8390d4faa3df
-
SHA1
ee8cf7689899772f5e59e66bc66b89fd19269ea0
-
SHA256
a70002c527a508f14051e606115ad0a04c045d7ffdb6a70ed01361b3ce7b3de2
-
SHA512
d91eb5032067e9b36a9b6d67ad2d335b650ff1de17b272740f94fcd58d644caae0dbd236e1da11284d5538b92b38d6c6d49b0c7ea0d0a96d2d47849bab6d86b6
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
18f1f44a28639057e66f8390d4faa3df.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aaffeb7a5f54025070b8e182b1fa7d98.exe 18f1f44a28639057e66f8390d4faa3df.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aaffeb7a5f54025070b8e182b1fa7d98.exe 18f1f44a28639057e66f8390d4faa3df.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
18f1f44a28639057e66f8390d4faa3df.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\aaffeb7a5f54025070b8e182b1fa7d98 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\18f1f44a28639057e66f8390d4faa3df.exe\" .." 18f1f44a28639057e66f8390d4faa3df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aaffeb7a5f54025070b8e182b1fa7d98 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\18f1f44a28639057e66f8390d4faa3df.exe\" .." 18f1f44a28639057e66f8390d4faa3df.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
18f1f44a28639057e66f8390d4faa3df.exedescription pid process Token: SeDebugPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: 33 4088 18f1f44a28639057e66f8390d4faa3df.exe Token: SeIncBasePriorityPrivilege 4088 18f1f44a28639057e66f8390d4faa3df.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
18f1f44a28639057e66f8390d4faa3df.exedescription pid process target process PID 4088 wrote to memory of 3284 4088 18f1f44a28639057e66f8390d4faa3df.exe netsh.exe PID 4088 wrote to memory of 3284 4088 18f1f44a28639057e66f8390d4faa3df.exe netsh.exe PID 4088 wrote to memory of 3284 4088 18f1f44a28639057e66f8390d4faa3df.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18f1f44a28639057e66f8390d4faa3df.exe"C:\Users\Admin\AppData\Local\Temp\18f1f44a28639057e66f8390d4faa3df.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\18f1f44a28639057e66f8390d4faa3df.exe" "18f1f44a28639057e66f8390d4faa3df.exe" ENABLE2⤵PID:3284