Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
07-01-2022 23:41
Behavioral task
behavioral1
Sample
c01241da9a4a4df62da605fa0a43f6c2.exe
Resource
win7-en-20211208
General
-
Target
c01241da9a4a4df62da605fa0a43f6c2.exe
-
Size
37KB
-
MD5
c01241da9a4a4df62da605fa0a43f6c2
-
SHA1
81db6c7ef0820e926b8c7f336e27f8ae3129995d
-
SHA256
4508d96492ef503a79ad969ea885b9b3574158e64fc3d13a41e7ebef007286ed
-
SHA512
b201b63fad95726ab14172784e3382ad7aee4ff70982845d8638cf3627f14491d83c21d99775433cdab120da24dc8306d70c19f966f5e16dbc7dbe11f9611a10
Malware Config
Extracted
njrat
im523
HacKed
6.tcp.ngrok.io:11947
d4a936dfd494d5f7b5e01de781d9fe51
-
reg_key
d4a936dfd494d5f7b5e01de781d9fe51
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 1 IoCs
Processes:
ApplicationFrameHost.exepid process 576 ApplicationFrameHost.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
ApplicationFrameHost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4a936dfd494d5f7b5e01de781d9fe51.exe ApplicationFrameHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4a936dfd494d5f7b5e01de781d9fe51.exe ApplicationFrameHost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ApplicationFrameHost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\d4a936dfd494d5f7b5e01de781d9fe51 = "\"C:\\Windows\\ApplicationFrameHost.exe\" .." ApplicationFrameHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\d4a936dfd494d5f7b5e01de781d9fe51 = "\"C:\\Windows\\ApplicationFrameHost.exe\" .." ApplicationFrameHost.exe -
Drops file in Windows directory 3 IoCs
Processes:
c01241da9a4a4df62da605fa0a43f6c2.exeApplicationFrameHost.exedescription ioc process File created C:\Windows\ApplicationFrameHost.exe c01241da9a4a4df62da605fa0a43f6c2.exe File opened for modification C:\Windows\ApplicationFrameHost.exe c01241da9a4a4df62da605fa0a43f6c2.exe File opened for modification C:\Windows\ApplicationFrameHost.exe ApplicationFrameHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ApplicationFrameHost.exepid process 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe 576 ApplicationFrameHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ApplicationFrameHost.exepid process 576 ApplicationFrameHost.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
ApplicationFrameHost.exedescription pid process Token: SeDebugPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe Token: 33 576 ApplicationFrameHost.exe Token: SeIncBasePriorityPrivilege 576 ApplicationFrameHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c01241da9a4a4df62da605fa0a43f6c2.exeApplicationFrameHost.exedescription pid process target process PID 1656 wrote to memory of 576 1656 c01241da9a4a4df62da605fa0a43f6c2.exe ApplicationFrameHost.exe PID 1656 wrote to memory of 576 1656 c01241da9a4a4df62da605fa0a43f6c2.exe ApplicationFrameHost.exe PID 1656 wrote to memory of 576 1656 c01241da9a4a4df62da605fa0a43f6c2.exe ApplicationFrameHost.exe PID 1656 wrote to memory of 576 1656 c01241da9a4a4df62da605fa0a43f6c2.exe ApplicationFrameHost.exe PID 576 wrote to memory of 992 576 ApplicationFrameHost.exe netsh.exe PID 576 wrote to memory of 992 576 ApplicationFrameHost.exe netsh.exe PID 576 wrote to memory of 992 576 ApplicationFrameHost.exe netsh.exe PID 576 wrote to memory of 992 576 ApplicationFrameHost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01241da9a4a4df62da605fa0a43f6c2.exe"C:\Users\Admin\AppData\Local\Temp\c01241da9a4a4df62da605fa0a43f6c2.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\ApplicationFrameHost.exe"C:\Windows\ApplicationFrameHost.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\ApplicationFrameHost.exe" "ApplicationFrameHost.exe" ENABLE3⤵PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c01241da9a4a4df62da605fa0a43f6c2
SHA181db6c7ef0820e926b8c7f336e27f8ae3129995d
SHA2564508d96492ef503a79ad969ea885b9b3574158e64fc3d13a41e7ebef007286ed
SHA512b201b63fad95726ab14172784e3382ad7aee4ff70982845d8638cf3627f14491d83c21d99775433cdab120da24dc8306d70c19f966f5e16dbc7dbe11f9611a10
-
MD5
c01241da9a4a4df62da605fa0a43f6c2
SHA181db6c7ef0820e926b8c7f336e27f8ae3129995d
SHA2564508d96492ef503a79ad969ea885b9b3574158e64fc3d13a41e7ebef007286ed
SHA512b201b63fad95726ab14172784e3382ad7aee4ff70982845d8638cf3627f14491d83c21d99775433cdab120da24dc8306d70c19f966f5e16dbc7dbe11f9611a10