Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-01-2022 06:58

General

  • Target

    ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe

  • Size

    346KB

  • MD5

    56615ae7f161d858f19ad0fcc49deec8

  • SHA1

    7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

  • SHA256

    ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

  • SHA512

    639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ZERO

C2

stub.ignorelist.com:5553

Mutex

a37326026fa6ee5a13f2532ba8c91513

Attributes
  • reg_key

    a37326026fa6ee5a13f2532ba8c91513

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe
    "C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:612
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe" "C:\Users\Admin\AppData\Roaming\njsvc.exe"
      2⤵
        PID:240
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\njsvc.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\AppData\Roaming\njsvc.exe
          "C:\Users\Admin\AppData\Roaming\njsvc.exe"
          3⤵
          • Executes dropped EXE
          • Drops startup file
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:788
          • C:\Users\Admin\AppData\Roaming\njsvc.exe
            "C:\Users\Admin\AppData\Roaming\njsvc.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1552
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\njsvc.exe" "njsvc.exe" ENABLE
              5⤵
                PID:1560

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • C:\Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • C:\Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • \Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • \Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • memory/240-60-0x0000000000000000-mapping.dmp

      • memory/612-54-0x00000000003C0000-0x000000000041C000-memory.dmp

        Filesize

        368KB

      • memory/612-55-0x00000000003C0000-0x000000000041C000-memory.dmp

        Filesize

        368KB

      • memory/612-56-0x00000000004D0000-0x00000000004E2000-memory.dmp

        Filesize

        72KB

      • memory/612-57-0x0000000005240000-0x0000000005241000-memory.dmp

        Filesize

        4KB

      • memory/612-58-0x000000007EF40000-0x000000007EF41000-memory.dmp

        Filesize

        4KB

      • memory/612-59-0x0000000005241000-0x0000000005242000-memory.dmp

        Filesize

        4KB

      • memory/788-70-0x000000007EF40000-0x000000007EF41000-memory.dmp

        Filesize

        4KB

      • memory/788-68-0x00000000003E0000-0x00000000003F2000-memory.dmp

        Filesize

        72KB

      • memory/788-69-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

        Filesize

        4KB

      • memory/788-67-0x0000000000280000-0x00000000002DC000-memory.dmp

        Filesize

        368KB

      • memory/788-71-0x0000000004BB1000-0x0000000004BB2000-memory.dmp

        Filesize

        4KB

      • memory/788-64-0x0000000000000000-mapping.dmp

      • memory/788-66-0x0000000000280000-0x00000000002DC000-memory.dmp

        Filesize

        368KB

      • memory/1372-61-0x0000000000000000-mapping.dmp

      • memory/1552-78-0x000000000040748E-mapping.dmp

      • memory/1552-74-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-75-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-76-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-73-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-86-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-83-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-80-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-88-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-87-0x0000000000080000-0x000000000008C000-memory.dmp

        Filesize

        48KB

      • memory/1552-91-0x0000000002190000-0x0000000002191000-memory.dmp

        Filesize

        4KB

      • memory/1560-89-0x0000000000000000-mapping.dmp

      • memory/1560-90-0x0000000075891000-0x0000000075893000-memory.dmp

        Filesize

        8KB