Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:26
Static task
static1
Behavioral task
behavioral1
Sample
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe
Resource
win10-en-20211208
General
-
Target
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe
-
Size
274KB
-
MD5
94c2a55970ad8b796e7610a8a8999a60
-
SHA1
9cfdb16851a0c9a5e698ac34cdc59d50dc8e8cf9
-
SHA256
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487
-
SHA512
5bdcaa4d746f0b004392aee2b2d7103571d140ae23ee4ee3aa25f7ec6e50175610321fe2db5cc263ab9ae3bb8386b9f8a755ac119b519095836046ece64456f3
Malware Config
Extracted
njrat
0.7.3
NOTIFICACIÓN
rewt6.duckdns.org:1990
Client.exe
-
reg_key
Client.exe
-
splitter
1990
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\" .." RegSvcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\" .." RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exedescription pid process target process PID 1448 set thread context of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exepid process 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe Token: SeDebugPrivilege 1112 RegSvcs.exe Token: 33 1112 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1112 RegSvcs.exe Token: 33 1112 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1112 RegSvcs.exe Token: 33 1112 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1112 RegSvcs.exe Token: 33 1112 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1112 RegSvcs.exe Token: 33 1112 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1112 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exeRegSvcs.exetaskeng.exedescription pid process target process PID 1448 wrote to memory of 392 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe schtasks.exe PID 1448 wrote to memory of 392 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe schtasks.exe PID 1448 wrote to memory of 392 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe schtasks.exe PID 1448 wrote to memory of 392 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe schtasks.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1448 wrote to memory of 1112 1448 0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe RegSvcs.exe PID 1112 wrote to memory of 1176 1112 RegSvcs.exe schtasks.exe PID 1112 wrote to memory of 1176 1112 RegSvcs.exe schtasks.exe PID 1112 wrote to memory of 1176 1112 RegSvcs.exe schtasks.exe PID 1112 wrote to memory of 1176 1112 RegSvcs.exe schtasks.exe PID 1112 wrote to memory of 1780 1112 RegSvcs.exe schtasks.exe PID 1112 wrote to memory of 1780 1112 RegSvcs.exe schtasks.exe PID 1112 wrote to memory of 1780 1112 RegSvcs.exe schtasks.exe PID 1112 wrote to memory of 1780 1112 RegSvcs.exe schtasks.exe PID 980 wrote to memory of 296 980 taskeng.exe RegSvcs.exe PID 980 wrote to memory of 296 980 taskeng.exe RegSvcs.exe PID 980 wrote to memory of 296 980 taskeng.exe RegSvcs.exe PID 980 wrote to memory of 296 980 taskeng.exe RegSvcs.exe PID 980 wrote to memory of 296 980 taskeng.exe RegSvcs.exe PID 980 wrote to memory of 296 980 taskeng.exe RegSvcs.exe PID 980 wrote to memory of 296 980 taskeng.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe"C:\Users\Admin\AppData\Local\Temp\0cddbc246dd35d0e7707910f12c968b7cebeb102afb61292aff19021d21fb487.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BowPmeNnBRwNr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6393.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {05A7291F-29BB-4C4C-8E5C-877353DD770B} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp6393.tmpMD5
feaee90c4135f7532ce20a6b8622997c
SHA1a7f6bf353d69d36ac1dcd2fe03286d6af23753b9
SHA256bb9273b4f46cb49e839a3893e049485fefadf010dcb789bb77eecd0ecce7240e
SHA512bc76314d4f6a2a4985633faf85453b3390b16c2d3e84a1522d9d9af03d9f7021534830b4ecb6172f0958d939ddef62242801bf27a374f024a46af4432423010b
-
memory/296-69-0x0000000000390000-0x00000000003B0000-memory.dmpFilesize
128KB
-
memory/296-68-0x00000000001A0000-0x00000000001AE000-memory.dmpFilesize
56KB
-
memory/1112-67-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1112-62-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1112-63-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1112-64-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1112-65-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1112-66-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1112-71-0x0000000001DD0000-0x0000000001DD1000-memory.dmpFilesize
4KB
-
memory/1448-59-0x0000000002090000-0x00000000020CC000-memory.dmpFilesize
240KB
-
memory/1448-60-0x0000000001EA0000-0x0000000001EBA000-memory.dmpFilesize
104KB
-
memory/1448-58-0x0000000000470000-0x000000000047A000-memory.dmpFilesize
40KB
-
memory/1448-55-0x0000000000210000-0x000000000025A000-memory.dmpFilesize
296KB
-
memory/1448-57-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/1448-56-0x00000000758A1000-0x00000000758A3000-memory.dmpFilesize
8KB