Analysis
-
max time kernel
156s -
max time network
169s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
#1763541093.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
#1763541093.exe
Resource
win10-en-20211208
General
-
Target
#1763541093.exe
-
Size
300.0MB
-
MD5
c8b67047772884a1bbca4b84cce30dac
-
SHA1
e55b2a5bffa0c72196f0cb5334436a93362ed419
-
SHA256
aba07cd1475a52821471edf1d361ffc6ee2a5ea13f8ef4eb7b0bd052f1b92c44
-
SHA512
98f7e29d0c92545ca579276488dd2ec473a3cdc1024c2313bc0f25118a4682fb2d02c4ea7ea230e8c952a04d2cd4bbc3d5d4660933539786dbcff0529aa9ff95
Malware Config
Extracted
njrat
1.9
HacKed
Microsoft.Exe
-
reg_key
Microsoft.Exe
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 1 IoCs
Processes:
jcudych.exepid process 800 jcudych.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
RegAsm.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.Exe RegAsm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.Exe RegAsm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RegAsm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" .." RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe\" .." RegAsm.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
#1763541093.exejcudych.exedescription pid process target process PID 1588 set thread context of 268 1588 #1763541093.exe RegAsm.exe PID 800 set thread context of 1456 800 jcudych.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1504 schtasks.exe 1464 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
#1763541093.exeRegAsm.exejcudych.exedescription pid process Token: SeDebugPrivilege 1588 #1763541093.exe Token: SeDebugPrivilege 268 RegAsm.exe Token: 33 268 RegAsm.exe Token: SeIncBasePriorityPrivilege 268 RegAsm.exe Token: SeDebugPrivilege 800 jcudych.exe Token: 33 268 RegAsm.exe Token: SeIncBasePriorityPrivilege 268 RegAsm.exe Token: 33 268 RegAsm.exe Token: SeIncBasePriorityPrivilege 268 RegAsm.exe Token: 33 268 RegAsm.exe Token: SeIncBasePriorityPrivilege 268 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
#1763541093.execmd.exeRegAsm.exetaskeng.exejcudych.execmd.exedescription pid process target process PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 268 1588 #1763541093.exe RegAsm.exe PID 1588 wrote to memory of 960 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 960 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 960 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 960 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 740 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 740 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 740 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 740 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 640 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 640 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 640 1588 #1763541093.exe cmd.exe PID 1588 wrote to memory of 640 1588 #1763541093.exe cmd.exe PID 740 wrote to memory of 1504 740 cmd.exe schtasks.exe PID 740 wrote to memory of 1504 740 cmd.exe schtasks.exe PID 740 wrote to memory of 1504 740 cmd.exe schtasks.exe PID 740 wrote to memory of 1504 740 cmd.exe schtasks.exe PID 268 wrote to memory of 1780 268 RegAsm.exe netsh.exe PID 268 wrote to memory of 1780 268 RegAsm.exe netsh.exe PID 268 wrote to memory of 1780 268 RegAsm.exe netsh.exe PID 268 wrote to memory of 1780 268 RegAsm.exe netsh.exe PID 1304 wrote to memory of 800 1304 taskeng.exe jcudych.exe PID 1304 wrote to memory of 800 1304 taskeng.exe jcudych.exe PID 1304 wrote to memory of 800 1304 taskeng.exe jcudych.exe PID 1304 wrote to memory of 800 1304 taskeng.exe jcudych.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1456 800 jcudych.exe RegAsm.exe PID 800 wrote to memory of 1640 800 jcudych.exe cmd.exe PID 800 wrote to memory of 1640 800 jcudych.exe cmd.exe PID 800 wrote to memory of 1640 800 jcudych.exe cmd.exe PID 800 wrote to memory of 1640 800 jcudych.exe cmd.exe PID 800 wrote to memory of 1156 800 jcudych.exe cmd.exe PID 800 wrote to memory of 1156 800 jcudych.exe cmd.exe PID 800 wrote to memory of 1156 800 jcudych.exe cmd.exe PID 800 wrote to memory of 1156 800 jcudych.exe cmd.exe PID 800 wrote to memory of 744 800 jcudych.exe cmd.exe PID 800 wrote to memory of 744 800 jcudych.exe cmd.exe PID 800 wrote to memory of 744 800 jcudych.exe cmd.exe PID 800 wrote to memory of 744 800 jcudych.exe cmd.exe PID 1156 wrote to memory of 1464 1156 cmd.exe schtasks.exe PID 1156 wrote to memory of 1464 1156 cmd.exe schtasks.exe PID 1156 wrote to memory of 1464 1156 cmd.exe schtasks.exe PID 1156 wrote to memory of 1464 1156 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\#1763541093.exe"C:\Users\Admin\AppData\Local\Temp\#1763541093.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" "RegAsm.exe" ENABLE3⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Local\Temp\jcudych"2⤵PID:960
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nanias" /tr "'C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nanias" /tr "'C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe'" /f3⤵
- Creates scheduled task(s)
PID:1504 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\#1763541093.exe" "C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe"2⤵PID:640
-
C:\Windows\system32\taskeng.exetaskeng.exe {B8FAA484-32C5-49A1-A965-20208CCAB829} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exeC:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1456
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Local\Temp\jcudych"3⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nanias" /tr "'C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nanias" /tr "'C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe'" /f4⤵
- Creates scheduled task(s)
PID:1464 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe" "C:\Users\Admin\AppData\Local\Temp\jcudych\jcudych.exe"3⤵PID:744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c8b67047772884a1bbca4b84cce30dac
SHA1e55b2a5bffa0c72196f0cb5334436a93362ed419
SHA256aba07cd1475a52821471edf1d361ffc6ee2a5ea13f8ef4eb7b0bd052f1b92c44
SHA51298f7e29d0c92545ca579276488dd2ec473a3cdc1024c2313bc0f25118a4682fb2d02c4ea7ea230e8c952a04d2cd4bbc3d5d4660933539786dbcff0529aa9ff95
-
MD5
c8b67047772884a1bbca4b84cce30dac
SHA1e55b2a5bffa0c72196f0cb5334436a93362ed419
SHA256aba07cd1475a52821471edf1d361ffc6ee2a5ea13f8ef4eb7b0bd052f1b92c44
SHA51298f7e29d0c92545ca579276488dd2ec473a3cdc1024c2313bc0f25118a4682fb2d02c4ea7ea230e8c952a04d2cd4bbc3d5d4660933539786dbcff0529aa9ff95