Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    20-12-2021 21:27

General

  • Target

    0eec81702c233690c337241bf260b6cb.exe

  • Size

    23KB

  • MD5

    0eec81702c233690c337241bf260b6cb

  • SHA1

    612bcf1d18bedb0a41ad1332d7a386ae17ffb6f5

  • SHA256

    edb3b0b8793cb5d62752e6cf2adf9f6d2e3fb736692d604c1ae63f607f0adbb9

  • SHA512

    701f1ae5e8b1d4b6256cf34417570f525606acf5c2c08b48f49c0b2fad6d8c16f97735555527ea738c2d7a7b3d3b3bec9753baba103a98a52bcbd528d3c2a9db

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacking

C2

2.tcp.ngrok.io:19922

Mutex

e2ad17efa2778f92dcb53a1b843be36d

Attributes
  • reg_key

    e2ad17efa2778f92dcb53a1b843be36d

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eec81702c233690c337241bf260b6cb.exe
    "C:\Users\Admin\AppData\Local\Temp\0eec81702c233690c337241bf260b6cb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\ProgramData\svchost.exe
      "C:\ProgramData\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3160
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE
        3⤵
          PID:3456

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\svchost.exe

      MD5

      0eec81702c233690c337241bf260b6cb

      SHA1

      612bcf1d18bedb0a41ad1332d7a386ae17ffb6f5

      SHA256

      edb3b0b8793cb5d62752e6cf2adf9f6d2e3fb736692d604c1ae63f607f0adbb9

      SHA512

      701f1ae5e8b1d4b6256cf34417570f525606acf5c2c08b48f49c0b2fad6d8c16f97735555527ea738c2d7a7b3d3b3bec9753baba103a98a52bcbd528d3c2a9db

    • C:\ProgramData\svchost.exe

      MD5

      0eec81702c233690c337241bf260b6cb

      SHA1

      612bcf1d18bedb0a41ad1332d7a386ae17ffb6f5

      SHA256

      edb3b0b8793cb5d62752e6cf2adf9f6d2e3fb736692d604c1ae63f607f0adbb9

      SHA512

      701f1ae5e8b1d4b6256cf34417570f525606acf5c2c08b48f49c0b2fad6d8c16f97735555527ea738c2d7a7b3d3b3bec9753baba103a98a52bcbd528d3c2a9db

    • memory/2808-115-0x0000000002CF0000-0x0000000002CF1000-memory.dmp

      Filesize

      4KB

    • memory/3160-116-0x0000000000000000-mapping.dmp

    • memory/3160-119-0x0000000003401000-0x0000000003402000-memory.dmp

      Filesize

      4KB

    • memory/3456-120-0x0000000000000000-mapping.dmp