Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14-01-2022 16:24
Behavioral task
behavioral1
Sample
cc2f5f3dfe758d7d8621a7435a3f9b79.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cc2f5f3dfe758d7d8621a7435a3f9b79.exe
Resource
win10v2004-en-20220113
General
-
Target
cc2f5f3dfe758d7d8621a7435a3f9b79.exe
-
Size
42KB
-
MD5
cc2f5f3dfe758d7d8621a7435a3f9b79
-
SHA1
b6745fa897f2d7e2791b3f4014eaf05e08eac100
-
SHA256
844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd
-
SHA512
c251250372928d0f0d2198d772c939c8a3b5a5ea5127ca7539a2c0ca728f81965ccda49f05d076a457019b9646eafa3b468fff9b86c7c158cff80b6012e02e13
Malware Config
Extracted
njrat
im523
Furios
gghosting221.ddns.net:6202
a618146538b273f7953a53ea719ce06d
-
reg_key
a618146538b273f7953a53ea719ce06d
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
System.exepid process 1148 System.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
System.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a618146538b273f7953a53ea719ce06d.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a618146538b273f7953a53ea719ce06d.exe System.exe -
Loads dropped DLL 1 IoCs
Processes:
cc2f5f3dfe758d7d8621a7435a3f9b79.exepid process 1632 cc2f5f3dfe758d7d8621a7435a3f9b79.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
System.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\a618146538b273f7953a53ea719ce06d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\a618146538b273f7953a53ea719ce06d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1552 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
System.exepid process 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe 1148 System.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
System.exepid process 1148 System.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
System.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1148 System.exe Token: SeDebugPrivilege 1552 taskkill.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe Token: 33 1148 System.exe Token: SeIncBasePriorityPrivilege 1148 System.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cc2f5f3dfe758d7d8621a7435a3f9b79.exeSystem.exedescription pid process target process PID 1632 wrote to memory of 1148 1632 cc2f5f3dfe758d7d8621a7435a3f9b79.exe System.exe PID 1632 wrote to memory of 1148 1632 cc2f5f3dfe758d7d8621a7435a3f9b79.exe System.exe PID 1632 wrote to memory of 1148 1632 cc2f5f3dfe758d7d8621a7435a3f9b79.exe System.exe PID 1632 wrote to memory of 1148 1632 cc2f5f3dfe758d7d8621a7435a3f9b79.exe System.exe PID 1148 wrote to memory of 1460 1148 System.exe netsh.exe PID 1148 wrote to memory of 1460 1148 System.exe netsh.exe PID 1148 wrote to memory of 1460 1148 System.exe netsh.exe PID 1148 wrote to memory of 1460 1148 System.exe netsh.exe PID 1148 wrote to memory of 1552 1148 System.exe taskkill.exe PID 1148 wrote to memory of 1552 1148 System.exe taskkill.exe PID 1148 wrote to memory of 1552 1148 System.exe taskkill.exe PID 1148 wrote to memory of 1552 1148 System.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc2f5f3dfe758d7d8621a7435a3f9b79.exe"C:\Users\Admin\AppData\Local\Temp\cc2f5f3dfe758d7d8621a7435a3f9b79.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\System.exe" "System.exe" ENABLE3⤵PID:1460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Exsample.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cc2f5f3dfe758d7d8621a7435a3f9b79
SHA1b6745fa897f2d7e2791b3f4014eaf05e08eac100
SHA256844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd
SHA512c251250372928d0f0d2198d772c939c8a3b5a5ea5127ca7539a2c0ca728f81965ccda49f05d076a457019b9646eafa3b468fff9b86c7c158cff80b6012e02e13
-
MD5
cc2f5f3dfe758d7d8621a7435a3f9b79
SHA1b6745fa897f2d7e2791b3f4014eaf05e08eac100
SHA256844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd
SHA512c251250372928d0f0d2198d772c939c8a3b5a5ea5127ca7539a2c0ca728f81965ccda49f05d076a457019b9646eafa3b468fff9b86c7c158cff80b6012e02e13
-
MD5
cc2f5f3dfe758d7d8621a7435a3f9b79
SHA1b6745fa897f2d7e2791b3f4014eaf05e08eac100
SHA256844652fb604b2b25b8ed69569eac116f46bbdc219fbc8e4be0c55aa1e6454ffd
SHA512c251250372928d0f0d2198d772c939c8a3b5a5ea5127ca7539a2c0ca728f81965ccda49f05d076a457019b9646eafa3b468fff9b86c7c158cff80b6012e02e13