Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-12-2021 20:12
Behavioral task
behavioral1
Sample
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
Resource
win10-en-20211208
General
-
Target
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
-
Size
27KB
-
MD5
17342737aa4da913d168e0c7a8f97737
-
SHA1
92a62d7222236de3c089a1efa103dae56a56abd5
-
SHA256
1b5623a3835cd779d255c177b644fb731f093fc60c8e73e7fd57e2330e85c214
-
SHA512
eb46a1bef25797a0ebf035708e5654c2a6b6638d6399926144fc22b6b7e2d628b9ea8b7f381546e2e7ec15ac57901316613a6ca05d60033c9465a3e2bf9ab991
Malware Config
Extracted
njrat
v2.0
HacKed
2.tcp.ngrok.io:10434
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 1 IoCs
Processes:
Payload.exepid process 432 Payload.exe -
Drops startup file 4 IoCs
Processes:
Payload.exe1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe -
Loads dropped DLL 1 IoCs
Processes:
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exepid process 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
Payload.exe1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Payload.exe" 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
Payload.exedescription pid process Token: SeDebugPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe Token: 33 432 Payload.exe Token: SeIncBasePriorityPrivilege 432 Payload.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exedescription pid process target process PID 1128 wrote to memory of 432 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe Payload.exe PID 1128 wrote to memory of 432 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe Payload.exe PID 1128 wrote to memory of 432 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe Payload.exe PID 1128 wrote to memory of 432 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe Payload.exe PID 1128 wrote to memory of 1388 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe attrib.exe PID 1128 wrote to memory of 1388 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe attrib.exe PID 1128 wrote to memory of 1388 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe attrib.exe PID 1128 wrote to memory of 1388 1128 1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe"C:\Users\Admin\AppData\Local\Temp\1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\Payload.exe"C:\Users\Admin\AppData\Roaming\Payload.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Payload.exe"2⤵
- Views/modifies file attributes
PID:1388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
74e0513f71ef18aae509f7751f25f453
SHA1aba9ff8944c79d81c9f38337722c89a733712b4b
SHA256a46f531044be1b29ac6346aa39fd048b19e8c799de2484d9978ee79cc96c8e8b
SHA512a8b47c292d7be35d560787c39978ad54ff7f7bd273a9db550b9795fc8a5666244397fa6e0f2888dcc4811550090acee479d0176e01965bea80598f10e971abd0
-
MD5
ce86a5f1ef5c036da720d8cba98512e7
SHA1530e6d5ae5b1ec43fa9c337afa18f34c49681558
SHA2562250c04d4c5b334c97fe69ba67021d1131e73746f96d9939745d7714472cce6d
SHA51257b300c44f312c6d9e13c56e24ebdb89398458256af18e3a2aa090d84e2d922ad86e2980d5c91015ca7255749d6be3cc042fb41f76a75f383cdffc83528583e9
-
MD5
17342737aa4da913d168e0c7a8f97737
SHA192a62d7222236de3c089a1efa103dae56a56abd5
SHA2561b5623a3835cd779d255c177b644fb731f093fc60c8e73e7fd57e2330e85c214
SHA512eb46a1bef25797a0ebf035708e5654c2a6b6638d6399926144fc22b6b7e2d628b9ea8b7f381546e2e7ec15ac57901316613a6ca05d60033c9465a3e2bf9ab991
-
MD5
17342737aa4da913d168e0c7a8f97737
SHA192a62d7222236de3c089a1efa103dae56a56abd5
SHA2561b5623a3835cd779d255c177b644fb731f093fc60c8e73e7fd57e2330e85c214
SHA512eb46a1bef25797a0ebf035708e5654c2a6b6638d6399926144fc22b6b7e2d628b9ea8b7f381546e2e7ec15ac57901316613a6ca05d60033c9465a3e2bf9ab991
-
MD5
17342737aa4da913d168e0c7a8f97737
SHA192a62d7222236de3c089a1efa103dae56a56abd5
SHA2561b5623a3835cd779d255c177b644fb731f093fc60c8e73e7fd57e2330e85c214
SHA512eb46a1bef25797a0ebf035708e5654c2a6b6638d6399926144fc22b6b7e2d628b9ea8b7f381546e2e7ec15ac57901316613a6ca05d60033c9465a3e2bf9ab991