Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14-01-2022 16:09
Behavioral task
behavioral1
Sample
e56578ff67914010aa9f663876b66c4a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e56578ff67914010aa9f663876b66c4a.exe
Resource
win10v2004-en-20220112
General
-
Target
e56578ff67914010aa9f663876b66c4a.exe
-
Size
37KB
-
MD5
e56578ff67914010aa9f663876b66c4a
-
SHA1
802b5d9f5be9fb8213b97567ebc1910e85ddd20f
-
SHA256
fc89c98b5be515bcbd365c74a9f4026d2d8dce04f9bc6255cc327b971c0bd407
-
SHA512
756b0fdfca550346207ddd292f6fa57d4db2e0207850dd9651edc341e716f80102ff6e8bdcf8fc000ce8535a1439c529b57d26313b58ad8613d99a978c17caf3
Malware Config
Extracted
njrat
im523
Furios
gghosting221.ddns.net:6202
5f458dd5f03f50e31781ca69de125d55
-
reg_key
5f458dd5f03f50e31781ca69de125d55
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WindowsUser.exepid process 756 WindowsUser.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
WindowsUser.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5f458dd5f03f50e31781ca69de125d55.exe WindowsUser.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5f458dd5f03f50e31781ca69de125d55.exe WindowsUser.exe -
Loads dropped DLL 1 IoCs
Processes:
e56578ff67914010aa9f663876b66c4a.exepid process 1212 e56578ff67914010aa9f663876b66c4a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WindowsUser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\5f458dd5f03f50e31781ca69de125d55 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsUser.exe\" .." WindowsUser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5f458dd5f03f50e31781ca69de125d55 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsUser.exe\" .." WindowsUser.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1180 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WindowsUser.exepid process 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe 756 WindowsUser.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WindowsUser.exepid process 756 WindowsUser.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
taskkill.exeWindowsUser.exedescription pid process Token: SeDebugPrivilege 1180 taskkill.exe Token: SeDebugPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe Token: 33 756 WindowsUser.exe Token: SeIncBasePriorityPrivilege 756 WindowsUser.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e56578ff67914010aa9f663876b66c4a.exeWindowsUser.exedescription pid process target process PID 1212 wrote to memory of 756 1212 e56578ff67914010aa9f663876b66c4a.exe WindowsUser.exe PID 1212 wrote to memory of 756 1212 e56578ff67914010aa9f663876b66c4a.exe WindowsUser.exe PID 1212 wrote to memory of 756 1212 e56578ff67914010aa9f663876b66c4a.exe WindowsUser.exe PID 1212 wrote to memory of 756 1212 e56578ff67914010aa9f663876b66c4a.exe WindowsUser.exe PID 756 wrote to memory of 764 756 WindowsUser.exe netsh.exe PID 756 wrote to memory of 764 756 WindowsUser.exe netsh.exe PID 756 wrote to memory of 764 756 WindowsUser.exe netsh.exe PID 756 wrote to memory of 764 756 WindowsUser.exe netsh.exe PID 756 wrote to memory of 1180 756 WindowsUser.exe taskkill.exe PID 756 wrote to memory of 1180 756 WindowsUser.exe taskkill.exe PID 756 wrote to memory of 1180 756 WindowsUser.exe taskkill.exe PID 756 wrote to memory of 1180 756 WindowsUser.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e56578ff67914010aa9f663876b66c4a.exe"C:\Users\Admin\AppData\Local\Temp\e56578ff67914010aa9f663876b66c4a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\WindowsUser.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUser.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\WindowsUser.exe" "WindowsUser.exe" ENABLE3⤵PID:764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Exsample.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e56578ff67914010aa9f663876b66c4a
SHA1802b5d9f5be9fb8213b97567ebc1910e85ddd20f
SHA256fc89c98b5be515bcbd365c74a9f4026d2d8dce04f9bc6255cc327b971c0bd407
SHA512756b0fdfca550346207ddd292f6fa57d4db2e0207850dd9651edc341e716f80102ff6e8bdcf8fc000ce8535a1439c529b57d26313b58ad8613d99a978c17caf3
-
MD5
e56578ff67914010aa9f663876b66c4a
SHA1802b5d9f5be9fb8213b97567ebc1910e85ddd20f
SHA256fc89c98b5be515bcbd365c74a9f4026d2d8dce04f9bc6255cc327b971c0bd407
SHA512756b0fdfca550346207ddd292f6fa57d4db2e0207850dd9651edc341e716f80102ff6e8bdcf8fc000ce8535a1439c529b57d26313b58ad8613d99a978c17caf3
-
MD5
e56578ff67914010aa9f663876b66c4a
SHA1802b5d9f5be9fb8213b97567ebc1910e85ddd20f
SHA256fc89c98b5be515bcbd365c74a9f4026d2d8dce04f9bc6255cc327b971c0bd407
SHA512756b0fdfca550346207ddd292f6fa57d4db2e0207850dd9651edc341e716f80102ff6e8bdcf8fc000ce8535a1439c529b57d26313b58ad8613d99a978c17caf3