Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-01-2022 22:33
Static task
static1
Behavioral task
behavioral1
Sample
A81N2M36CINV0ICERECEIPT.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
A81N2M36CINV0ICERECEIPT.exe
Resource
win10-en-20211208
General
-
Target
A81N2M36CINV0ICERECEIPT.exe
-
Size
679KB
-
MD5
ba79aabe98bf01d3f35359a9332be48f
-
SHA1
0dbca5bfa445fca16f31bddfe3be23b1a41a80c0
-
SHA256
0a9d287a3539c979a8c215ca003ca35293c324644e2f2c4dc3a38b4c7f9fa143
-
SHA512
ad16e94537e80d6a185c6be021eb3b459e204fcc424366d89b222849f60ba00478335a036e66c197609f9a77161b093f7240c7ef1d699ff842fd9289d6e828d3
Malware Config
Extracted
njrat
1.9
HacKed
Microsoft.Exe
-
reg_key
Microsoft.Exe
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
A81N2M36CINV0ICERECEIPT.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion A81N2M36CINV0ICERECEIPT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion A81N2M36CINV0ICERECEIPT.exe -
Drops startup file 2 IoCs
Processes:
RegAsm.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.Exe RegAsm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.Exe RegAsm.exe -
Processes:
A81N2M36CINV0ICERECEIPT.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Microsoft.NET\Framework\CADCDADBAEDEFBCBFCADB\svchost.exe = "0" A81N2M36CINV0ICERECEIPT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\A81N2M36CINV0ICERECEIPT.exe = "0" A81N2M36CINV0ICERECEIPT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths A81N2M36CINV0ICERECEIPT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions A81N2M36CINV0ICERECEIPT.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
A81N2M36CINV0ICERECEIPT.exeRegAsm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\BEABFBACFFDDAFBFBAEECFC = "C:\\Windows\\Microsoft.NET\\Framework\\CADCDADBAEDEFBCBFCADB\\svchost.exe" A81N2M36CINV0ICERECEIPT.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BEABFBACFFDDAFBFBAEECFC = "C:\\Windows\\Microsoft.NET\\Framework\\CADCDADBAEDEFBCBFCADB\\svchost.exe" A81N2M36CINV0ICERECEIPT.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" .." RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" .." RegAsm.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
A81N2M36CINV0ICERECEIPT.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum A81N2M36CINV0ICERECEIPT.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 A81N2M36CINV0ICERECEIPT.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
A81N2M36CINV0ICERECEIPT.exedescription pid process target process PID 1608 set thread context of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe -
Drops file in Windows directory 2 IoCs
Processes:
A81N2M36CINV0ICERECEIPT.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\CADCDADBAEDEFBCBFCADB\svchost.exe A81N2M36CINV0ICERECEIPT.exe File opened for modification C:\Windows\Microsoft.NET\Framework\CADCDADBAEDEFBCBFCADB A81N2M36CINV0ICERECEIPT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
A81N2M36CINV0ICERECEIPT.exepowershell.exepowershell.exepowershell.exepid process 1608 A81N2M36CINV0ICERECEIPT.exe 1608 A81N2M36CINV0ICERECEIPT.exe 1608 A81N2M36CINV0ICERECEIPT.exe 1608 A81N2M36CINV0ICERECEIPT.exe 1608 A81N2M36CINV0ICERECEIPT.exe 1608 A81N2M36CINV0ICERECEIPT.exe 1248 powershell.exe 1460 powershell.exe 288 powershell.exe 1608 A81N2M36CINV0ICERECEIPT.exe 1608 A81N2M36CINV0ICERECEIPT.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
A81N2M36CINV0ICERECEIPT.exepowershell.exepowershell.exepowershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1608 A81N2M36CINV0ICERECEIPT.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 288 powershell.exe Token: SeDebugPrivilege 1500 RegAsm.exe Token: 33 1500 RegAsm.exe Token: SeIncBasePriorityPrivilege 1500 RegAsm.exe Token: 33 1500 RegAsm.exe Token: SeIncBasePriorityPrivilege 1500 RegAsm.exe Token: 33 1500 RegAsm.exe Token: SeIncBasePriorityPrivilege 1500 RegAsm.exe Token: 33 1500 RegAsm.exe Token: SeIncBasePriorityPrivilege 1500 RegAsm.exe Token: 33 1500 RegAsm.exe Token: SeIncBasePriorityPrivilege 1500 RegAsm.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
A81N2M36CINV0ICERECEIPT.exeRegAsm.exedescription pid process target process PID 1608 wrote to memory of 1460 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1460 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1460 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1460 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 288 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 288 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 288 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 288 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1248 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1248 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1248 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1248 1608 A81N2M36CINV0ICERECEIPT.exe powershell.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1608 wrote to memory of 1500 1608 A81N2M36CINV0ICERECEIPT.exe RegAsm.exe PID 1500 wrote to memory of 1652 1500 RegAsm.exe netsh.exe PID 1500 wrote to memory of 1652 1500 RegAsm.exe netsh.exe PID 1500 wrote to memory of 1652 1500 RegAsm.exe netsh.exe PID 1500 wrote to memory of 1652 1500 RegAsm.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\A81N2M36CINV0ICERECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\A81N2M36CINV0ICERECEIPT.exe"1⤵
- Checks BIOS information in registry
- Windows security modification
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\CADCDADBAEDEFBCBFCADB\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\CADCDADBAEDEFBCBFCADB\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\A81N2M36CINV0ICERECEIPT.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" "RegAsm.exe" ENABLE3⤵PID:1652
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
MD5d4c93b8047c37799dd0b4b86192b7508
SHA12fd525563dc29128d351c861bbd675a34811c6a4
SHA256662673c111a5f3fc252781b68529bc4eebb6b9146294945faf31a2766477e276
SHA512c8495e085f31e6cfbc5a6612a7ff17cc33a71d91bb3e977e2bafe9d9bb71218dcb483f48587c931acd319ceb1f892f1dd14a1f2839759144c7fbee17cc7f6598