Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    06-01-2022 06:58

General

  • Target

    ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe

  • Size

    346KB

  • MD5

    56615ae7f161d858f19ad0fcc49deec8

  • SHA1

    7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

  • SHA256

    ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

  • SHA512

    639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ZERO

C2

stub.ignorelist.com:5553

Mutex

a37326026fa6ee5a13f2532ba8c91513

Attributes
  • reg_key

    a37326026fa6ee5a13f2532ba8c91513

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe
    "C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17.exe" "C:\Users\Admin\AppData\Roaming\njsvc.exe"
      2⤵
        PID:3204
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\njsvc.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Users\Admin\AppData\Roaming\njsvc.exe
          "C:\Users\Admin\AppData\Roaming\njsvc.exe"
          3⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3248
          • C:\Users\Admin\AppData\Roaming\njsvc.exe
            "C:\Users\Admin\AppData\Roaming\njsvc.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3236
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\njsvc.exe" "njsvc.exe" ENABLE
              5⤵
                PID:984

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\njsvc.exe.log

        MD5

        29e5c61d6e309e714f2af216a4f5040e

        SHA1

        1389065c8b7dd7655bc431cd29b80ea51ea6fb8b

        SHA256

        93edd74fc604add82655969e0d0956098bf57c77341641d93776780f5124e22b

        SHA512

        ec6a41c46259a693f75128f0637faa13e9dc17652e6eb7c78b96bd6ce1c7add4012a468c4e83bbfe8dfb5e4ce53c5ee58f8ed8d41e825e0404965e7c7dffb476

      • C:\Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • C:\Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • C:\Users\Admin\AppData\Roaming\njsvc.exe

        MD5

        56615ae7f161d858f19ad0fcc49deec8

        SHA1

        7f6b720ab3f72a7641a2fd91d2febdeb85816eb0

        SHA256

        ae8fa9b59fb15269e27cbbff6ad480cb53699eb56ff7bb36bcfd1b952a183e17

        SHA512

        639b260b105c945bc2c29602bd70573e6038094388167578a67adde839e0dcc09f5fa1cae663916f99022a23a9bba5341b2fd79117227ceb4d38e330a56ca58d

      • memory/984-147-0x0000000000000000-mapping.dmp

      • memory/2328-121-0x0000000005A00000-0x0000000005A01000-memory.dmp

        Filesize

        4KB

      • memory/2328-115-0x0000000000C90000-0x0000000000CEC000-memory.dmp

        Filesize

        368KB

      • memory/2328-122-0x000000007F070000-0x000000007F071000-memory.dmp

        Filesize

        4KB

      • memory/2328-123-0x0000000005C80000-0x0000000005CE6000-memory.dmp

        Filesize

        408KB

      • memory/2328-120-0x0000000005980000-0x00000000059C4000-memory.dmp

        Filesize

        272KB

      • memory/2328-119-0x0000000005FB0000-0x00000000064AE000-memory.dmp

        Filesize

        5.0MB

      • memory/2328-118-0x0000000005A10000-0x0000000005AA2000-memory.dmp

        Filesize

        584KB

      • memory/2328-117-0x0000000002FA0000-0x0000000002FB2000-memory.dmp

        Filesize

        72KB

      • memory/2328-116-0x0000000000C90000-0x0000000000CEC000-memory.dmp

        Filesize

        368KB

      • memory/3204-124-0x0000000000000000-mapping.dmp

      • memory/3236-140-0x000000000040748E-mapping.dmp

      • memory/3236-143-0x0000000000170000-0x000000000017C000-memory.dmp

        Filesize

        48KB

      • memory/3236-150-0x0000000004A40000-0x0000000004A4A000-memory.dmp

        Filesize

        40KB

      • memory/3236-149-0x0000000004A60000-0x0000000004F5E000-memory.dmp

        Filesize

        5.0MB

      • memory/3236-148-0x0000000004BC0000-0x0000000004C52000-memory.dmp

        Filesize

        584KB

      • memory/3236-146-0x0000000004F60000-0x000000000545E000-memory.dmp

        Filesize

        5.0MB

      • memory/3236-145-0x00000000049A0000-0x0000000004A3C000-memory.dmp

        Filesize

        624KB

      • memory/3236-144-0x0000000000170000-0x000000000017C000-memory.dmp

        Filesize

        48KB

      • memory/3248-135-0x00000000056F0000-0x00000000056F1000-memory.dmp

        Filesize

        4KB

      • memory/3248-130-0x0000000000930000-0x000000000098C000-memory.dmp

        Filesize

        368KB

      • memory/3248-129-0x0000000000930000-0x000000000098C000-memory.dmp

        Filesize

        368KB

      • memory/3248-138-0x00000000065A0000-0x000000000663C000-memory.dmp

        Filesize

        624KB

      • memory/3248-126-0x0000000000000000-mapping.dmp

      • memory/3248-137-0x0000000005920000-0x0000000005986000-memory.dmp

        Filesize

        408KB

      • memory/3248-136-0x000000007F720000-0x000000007F721000-memory.dmp

        Filesize

        4KB

      • memory/3248-131-0x0000000002BF0000-0x0000000002C02000-memory.dmp

        Filesize

        72KB

      • memory/3248-134-0x0000000005700000-0x0000000005744000-memory.dmp

        Filesize

        272KB

      • memory/3248-133-0x0000000005C00000-0x00000000060FE000-memory.dmp

        Filesize

        5.0MB

      • memory/3248-132-0x0000000005630000-0x00000000056C2000-memory.dmp

        Filesize

        584KB

      • memory/3512-125-0x0000000000000000-mapping.dmp