Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:04
Static task
static1
Behavioral task
behavioral1
Sample
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe
Resource
win10-en-20211208
General
-
Target
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe
-
Size
454KB
-
MD5
724c9322da3b1c5f7994a466fbb6dc09
-
SHA1
d993e3da6da34581ba6d3ca18d33356767cbecf7
-
SHA256
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3
-
SHA512
7d2ae83d9ad9ae790ee9c7b2fb1b35456b27c0e79e0fb313ad58aa342a2bd058b6b7337aa354b4b7462081ef73cbddc982a1be503aff135e4f3a1b6c9f808a7f
Malware Config
Extracted
njrat
0.7.3
ESTACIÓN TERPEL
estacion373.duckdns.org:1990
Client.exe
-
reg_key
Client.exe
-
splitter
1990
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\" .." RegSvcs.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\" .." RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exedescription pid process target process PID 2700 set thread context of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3544 schtasks.exe 2408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exepid process 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe Token: SeDebugPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe Token: 33 2920 RegSvcs.exe Token: SeIncBasePriorityPrivilege 2920 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exeRegSvcs.exedescription pid process target process PID 2700 wrote to memory of 3544 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe schtasks.exe PID 2700 wrote to memory of 3544 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe schtasks.exe PID 2700 wrote to memory of 3544 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe schtasks.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2700 wrote to memory of 2920 2700 dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe RegSvcs.exe PID 2920 wrote to memory of 4016 2920 RegSvcs.exe schtasks.exe PID 2920 wrote to memory of 4016 2920 RegSvcs.exe schtasks.exe PID 2920 wrote to memory of 4016 2920 RegSvcs.exe schtasks.exe PID 2920 wrote to memory of 2408 2920 RegSvcs.exe schtasks.exe PID 2920 wrote to memory of 2408 2920 RegSvcs.exe schtasks.exe PID 2920 wrote to memory of 2408 2920 RegSvcs.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe"C:\Users\Admin\AppData\Local\Temp\dc52cb3d58087c26b2c4ccc95ec2a50df8b2ada10d368251b836b033f36eb0e3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fkHhuFSCKBkxD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4EF7.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.logMD5
8c0458bb9ea02d50565175e38d577e35
SHA1f0b50702cd6470f3c17d637908f83212fdbdb2f2
SHA256c578e86db701b9afa3626e804cf434f9d32272ff59fb32fa9a51835e5a148b53
SHA512804a47494d9a462ffa6f39759480700ecbe5a7f3a15ec3a6330176ed9c04695d2684bf6bf85ab86286d52e7b727436d0bb2e8da96e20d47740b5ce3f856b5d0f
-
C:\Users\Admin\AppData\Local\Temp\tmp4EF7.tmpMD5
160dd3ef22eea865284370aa9f731e0c
SHA1fe8c03642c629184e641043f4a006ffeea0ead86
SHA256ef19833bc8f1564e53a9276ff3b8da72f66d4a718e8c261b2e89ee91a74cf1ed
SHA5126ca3350b5200230e9b33b50566285c56b48a9c782d7e9f7ad9832baff3208c92a65264da83d698d3ba28ff3f3a3f0eb2bc0e5a13cdfa2a6ad7d48475bf857fd9
-
memory/1244-130-0x0000000005450000-0x0000000005470000-memory.dmpFilesize
128KB
-
memory/1244-129-0x0000000005490000-0x00000000054CC000-memory.dmpFilesize
240KB
-
memory/1244-128-0x0000000000D10000-0x0000000000D1E000-memory.dmpFilesize
56KB
-
memory/2700-123-0x00000000068F0000-0x0000000006922000-memory.dmpFilesize
200KB
-
memory/2700-121-0x000000000B2A0000-0x000000000B5F0000-memory.dmpFilesize
3.3MB
-
memory/2700-122-0x000000000B820000-0x000000000B876000-memory.dmpFilesize
344KB
-
memory/2700-115-0x0000000000F90000-0x0000000001008000-memory.dmpFilesize
480KB
-
memory/2700-124-0x000000000F180000-0x000000000F21C000-memory.dmpFilesize
624KB
-
memory/2700-120-0x0000000003240000-0x000000000324C000-memory.dmpFilesize
48KB
-
memory/2700-119-0x0000000007DC0000-0x0000000007DCA000-memory.dmpFilesize
40KB
-
memory/2700-118-0x0000000007C70000-0x000000000816E000-memory.dmpFilesize
5.0MB
-
memory/2700-117-0x0000000007D10000-0x0000000007DA2000-memory.dmpFilesize
584KB
-
memory/2700-116-0x0000000008170000-0x000000000866E000-memory.dmpFilesize
5.0MB
-
memory/2920-126-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2920-127-0x0000000004F80000-0x000000000547E000-memory.dmpFilesize
5.0MB