Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
11-01-2022 07:55
Behavioral task
behavioral1
Sample
93abd5fd5684804d71380d38d29229c4.exe
Resource
win7-en-20211208
General
-
Target
93abd5fd5684804d71380d38d29229c4.exe
-
Size
93KB
-
MD5
93abd5fd5684804d71380d38d29229c4
-
SHA1
37fc6c58c910d7ed3ad47d25698f52f5a8f7aeb9
-
SHA256
13f740ded52b5779a1087e1d7a333b622ad3ed80a962e4211e76adf42cc0765b
-
SHA512
036f32739370925d2362aa28aaf543b90e2facb7859b2ca0c46c59bcc749ec74f6823c70a20b50fd580a9ec77846c58a946ae933e404fc603b689d30bf095b0a
Malware Config
Extracted
njrat
0.7d
HacKed
Ni50Y3Aubmdyb2suaW8Strik:MTk5MzA=
8ed939d5d78ac3a222ff6581695b4837
-
reg_key
8ed939d5d78ac3a222ff6581695b4837
-
splitter
|'|'|
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1636 svchost.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 4 IoCs
Processes:
93abd5fd5684804d71380d38d29229c4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe 93abd5fd5684804d71380d38d29229c4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe 93abd5fd5684804d71380d38d29229c4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8ed939d5d78ac3a222ff6581695b4837Windows Update.exe 93abd5fd5684804d71380d38d29229c4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8ed939d5d78ac3a222ff6581695b4837Windows Update.exe 93abd5fd5684804d71380d38d29229c4.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
93abd5fd5684804d71380d38d29229c4.exepid process 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe 3376 93abd5fd5684804d71380d38d29229c4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
93abd5fd5684804d71380d38d29229c4.exedescription pid process Token: SeDebugPrivilege 3376 93abd5fd5684804d71380d38d29229c4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
93abd5fd5684804d71380d38d29229c4.exedescription pid process target process PID 3376 wrote to memory of 3532 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 3532 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 3532 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 4020 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 4020 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 4020 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 4036 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 4036 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 4036 3376 93abd5fd5684804d71380d38d29229c4.exe netsh.exe PID 3376 wrote to memory of 1636 3376 93abd5fd5684804d71380d38d29229c4.exe svchost.exe PID 3376 wrote to memory of 1636 3376 93abd5fd5684804d71380d38d29229c4.exe svchost.exe PID 3376 wrote to memory of 1636 3376 93abd5fd5684804d71380d38d29229c4.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93abd5fd5684804d71380d38d29229c4.exe"C:\Users\Admin\AppData\Local\Temp\93abd5fd5684804d71380d38d29229c4.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\93abd5fd5684804d71380d38d29229c4.exe" "93abd5fd5684804d71380d38d29229c4.exe" ENABLE2⤵PID:3532
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\93abd5fd5684804d71380d38d29229c4.exe"2⤵PID:4020
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\93abd5fd5684804d71380d38d29229c4.exe" "93abd5fd5684804d71380d38d29229c4.exe" ENABLE2⤵PID:4036
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"2⤵
- Executes dropped EXE
PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
93abd5fd5684804d71380d38d29229c4
SHA137fc6c58c910d7ed3ad47d25698f52f5a8f7aeb9
SHA25613f740ded52b5779a1087e1d7a333b622ad3ed80a962e4211e76adf42cc0765b
SHA512036f32739370925d2362aa28aaf543b90e2facb7859b2ca0c46c59bcc749ec74f6823c70a20b50fd580a9ec77846c58a946ae933e404fc603b689d30bf095b0a
-
MD5
93abd5fd5684804d71380d38d29229c4
SHA137fc6c58c910d7ed3ad47d25698f52f5a8f7aeb9
SHA25613f740ded52b5779a1087e1d7a333b622ad3ed80a962e4211e76adf42cc0765b
SHA512036f32739370925d2362aa28aaf543b90e2facb7859b2ca0c46c59bcc749ec74f6823c70a20b50fd580a9ec77846c58a946ae933e404fc603b689d30bf095b0a
-
MD5
8f11404a507cfb98455f89a534077f73
SHA10716c668f504450353527aff1a6457b8348cf435
SHA256f7c301f3fcce1c2444b540090e5024f0cea1806ab8ae1d81901ecc3b63334cbb
SHA51285403dd06da5851e8c4d727ca8d87cc0e7ff4974942ec22123366684ed0e51b543a29b6d2521e2e65784c69884fde8d711e5064f104b098293fcd18c44769492