Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-01-2022 16:32
Behavioral task
behavioral1
Sample
844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exe
Resource
win10-en-20211208
General
-
Target
844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exe
-
Size
42KB
-
MD5
cc2f5f3dfe758d7d8621a7435a3f9b79
-
SHA1
b6745fa897f2d7e2791b3f4014eaf05e08eac100
-
SHA256
844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd
-
SHA512
c251250372928d0f0d2198d772c939c8a3b5a5ea5127ca7539a2c0ca728f81965ccda49f05d076a457019b9646eafa3b468fff9b86c7c158cff80b6012e02e13
Malware Config
Extracted
njrat
im523
Furios
gghosting221.ddns.net:6202
a618146538b273f7953a53ea719ce06d
-
reg_key
a618146538b273f7953a53ea719ce06d
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
System.exepid process 2632 System.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
System.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a618146538b273f7953a53ea719ce06d.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a618146538b273f7953a53ea719ce06d.exe System.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
System.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\a618146538b273f7953a53ea719ce06d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\a618146538b273f7953a53ea719ce06d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 920 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
System.exepid process 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe 2632 System.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
System.exepid process 2632 System.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
System.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2632 System.exe Token: SeDebugPrivilege 920 taskkill.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe Token: 33 2632 System.exe Token: SeIncBasePriorityPrivilege 2632 System.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exeSystem.exedescription pid process target process PID 2668 wrote to memory of 2632 2668 844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exe System.exe PID 2668 wrote to memory of 2632 2668 844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exe System.exe PID 2668 wrote to memory of 2632 2668 844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exe System.exe PID 2632 wrote to memory of 2296 2632 System.exe netsh.exe PID 2632 wrote to memory of 2296 2632 System.exe netsh.exe PID 2632 wrote to memory of 2296 2632 System.exe netsh.exe PID 2632 wrote to memory of 920 2632 System.exe taskkill.exe PID 2632 wrote to memory of 920 2632 System.exe taskkill.exe PID 2632 wrote to memory of 920 2632 System.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exe"C:\Users\Admin\AppData\Local\Temp\844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\System.exe" "System.exe" ENABLE3⤵PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Exsample.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cc2f5f3dfe758d7d8621a7435a3f9b79
SHA1b6745fa897f2d7e2791b3f4014eaf05e08eac100
SHA256844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd
SHA512c251250372928d0f0d2198d772c939c8a3b5a5ea5127ca7539a2c0ca728f81965ccda49f05d076a457019b9646eafa3b468fff9b86c7c158cff80b6012e02e13
-
MD5
cc2f5f3dfe758d7d8621a7435a3f9b79
SHA1b6745fa897f2d7e2791b3f4014eaf05e08eac100
SHA256844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd
SHA512c251250372928d0f0d2198d772c939c8a3b5a5ea5127ca7539a2c0ca728f81965ccda49f05d076a457019b9646eafa3b468fff9b86c7c158cff80b6012e02e13