Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-12-2021 17:54

General

  • Target

    tmp/603fc39a-a94f-4607-a68c-cdfe8e403c95_1643.exe

  • Size

    23KB

  • MD5

    558d83545b3096f901e84dd00bccd9e8

  • SHA1

    f8a62eb35a55307eaea56a4d689b1d9e68e303ea

  • SHA256

    b7f5245002784627da1996be95b0e18abd73df0da01cbb268e39c5d39f04f4e8

  • SHA512

    af4bcdb32071d2aef39fbe71f54466af07eb788ba9494af7f7937c93ac77cf341465bb733a0ba587f12606dc4c114d81293ae287f2041c8df0c3539bb3ce857d

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp\603fc39a-a94f-4607-a68c-cdfe8e403c95_1643.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp\603fc39a-a94f-4607-a68c-cdfe8e403c95_1643.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\tmp\603fc39a-a94f-4607-a68c-cdfe8e403c95_1643.exe" "603fc39a-a94f-4607-a68c-cdfe8e403c95_1643.exe" ENABLE
      2⤵
        PID:520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/520-55-0x0000000000000000-mapping.dmp

    • memory/1796-53-0x0000000076C61000-0x0000000076C63000-memory.dmp

      Filesize

      8KB

    • memory/1796-54-0x0000000000450000-0x0000000000451000-memory.dmp

      Filesize

      4KB