Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-01-2022 06:58
Static task
static1
Behavioral task
behavioral1
Sample
ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe
Resource
win10-en-20211208
General
-
Target
ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe
-
Size
346KB
-
MD5
56615ae7f161d858f19ad0fcc49deec8
-
SHA1
7f6b720ab3f72a7641a2fd91d2febdeb85816eb0
-
SHA256
ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17
-
SHA512
639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d
Malware Config
Extracted
njrat
0.7d
ZERO
stub.ignorelist.com:5553
a37326026fa6ee5a13f2532ba8c91513
-
reg_key
a37326026fa6ee5a13f2532ba8c91513
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
njsvc.exenjsvc.exepid process 788 njsvc.exe 1552 njsvc.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 1 IoCs
Processes:
njsvc.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\njsvc.lnk njsvc.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exenjsvc.exepid process 1372 cmd.exe 788 njsvc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
njsvc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\a37326026fa6ee5a13f2532ba8c91513 = "\"C:\\Users\\Admin\\AppData\\Roaming\\njsvc.exe\" .." njsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\a37326026fa6ee5a13f2532ba8c91513 = "\"C:\\Users\\Admin\\AppData\\Roaming\\njsvc.exe\" .." njsvc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
njsvc.exedescription pid process target process PID 788 set thread context of 1552 788 njsvc.exe njsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exenjsvc.exenjsvc.exedescription pid process Token: SeDebugPrivilege 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe Token: SeDebugPrivilege 788 njsvc.exe Token: SeDebugPrivilege 1552 njsvc.exe Token: 33 1552 njsvc.exe Token: SeIncBasePriorityPrivilege 1552 njsvc.exe Token: 33 1552 njsvc.exe Token: SeIncBasePriorityPrivilege 1552 njsvc.exe Token: 33 1552 njsvc.exe Token: SeIncBasePriorityPrivilege 1552 njsvc.exe Token: 33 1552 njsvc.exe Token: SeIncBasePriorityPrivilege 1552 njsvc.exe Token: 33 1552 njsvc.exe Token: SeIncBasePriorityPrivilege 1552 njsvc.exe Token: 33 1552 njsvc.exe Token: SeIncBasePriorityPrivilege 1552 njsvc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.execmd.exenjsvc.exenjsvc.exedescription pid process target process PID 612 wrote to memory of 240 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 612 wrote to memory of 240 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 612 wrote to memory of 240 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 612 wrote to memory of 240 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 612 wrote to memory of 1372 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 612 wrote to memory of 1372 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 612 wrote to memory of 1372 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 612 wrote to memory of 1372 612 ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe cmd.exe PID 1372 wrote to memory of 788 1372 cmd.exe njsvc.exe PID 1372 wrote to memory of 788 1372 cmd.exe njsvc.exe PID 1372 wrote to memory of 788 1372 cmd.exe njsvc.exe PID 1372 wrote to memory of 788 1372 cmd.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 788 wrote to memory of 1552 788 njsvc.exe njsvc.exe PID 1552 wrote to memory of 1560 1552 njsvc.exe netsh.exe PID 1552 wrote to memory of 1560 1552 njsvc.exe netsh.exe PID 1552 wrote to memory of 1560 1552 njsvc.exe netsh.exe PID 1552 wrote to memory of 1560 1552 njsvc.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe"C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe" "C:\Users\Admin\AppData\Roaming\njsvc.exe"2⤵PID:240
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\njsvc.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Roaming\njsvc.exe"C:\Users\Admin\AppData\Roaming\njsvc.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Roaming\njsvc.exe"C:\Users\Admin\AppData\Roaming\njsvc.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\njsvc.exe" "njsvc.exe" ENABLE5⤵PID:1560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
56615ae7f161d858f19ad0fcc49deec8
SHA17f6b720ab3f72a7641a2fd91d2febdeb85816eb0
SHA256ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17
SHA512639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d
-
MD5
56615ae7f161d858f19ad0fcc49deec8
SHA17f6b720ab3f72a7641a2fd91d2febdeb85816eb0
SHA256ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17
SHA512639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d
-
MD5
56615ae7f161d858f19ad0fcc49deec8
SHA17f6b720ab3f72a7641a2fd91d2febdeb85816eb0
SHA256ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17
SHA512639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d
-
MD5
56615ae7f161d858f19ad0fcc49deec8
SHA17f6b720ab3f72a7641a2fd91d2febdeb85816eb0
SHA256ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17
SHA512639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d
-
MD5
56615ae7f161d858f19ad0fcc49deec8
SHA17f6b720ab3f72a7641a2fd91d2febdeb85816eb0
SHA256ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17
SHA512639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d