Analysis
-
max time kernel
199s -
max time network
230s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 23:35
Static task
static1
Behavioral task
behavioral1
Sample
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe
Resource
win10-en-20211208
General
-
Target
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe
-
Size
216KB
-
MD5
90b1135d0678e51273bdd36523b59f98
-
SHA1
827ec99df4e10e99e4095a8ddbb95398a90ae728
-
SHA256
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4
-
SHA512
b8b26661053a81eaf9f86109d947ef07f30bbf77113e67bc7e2397dfafeeebd37b279801b0c3edc759dedb68659ec494f963824423a85809c0a4c7aa81167727
Malware Config
Extracted
njrat
0.7.3
FIFA 2020
federa.duckdns.org:1990
Client.exe
-
reg_key
Client.exe
-
splitter
1990
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\" .." RegSvcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\" .." RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exedescription pid process target process PID 948 set thread context of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exepid process 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe Token: SeDebugPrivilege 3504 RegSvcs.exe Token: 33 3504 RegSvcs.exe Token: SeIncBasePriorityPrivilege 3504 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exeRegSvcs.exedescription pid process target process PID 948 wrote to memory of 856 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe schtasks.exe PID 948 wrote to memory of 856 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe schtasks.exe PID 948 wrote to memory of 856 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe schtasks.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 948 wrote to memory of 3504 948 5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe RegSvcs.exe PID 3504 wrote to memory of 1548 3504 RegSvcs.exe schtasks.exe PID 3504 wrote to memory of 1548 3504 RegSvcs.exe schtasks.exe PID 3504 wrote to memory of 1548 3504 RegSvcs.exe schtasks.exe PID 3504 wrote to memory of 1728 3504 RegSvcs.exe schtasks.exe PID 3504 wrote to memory of 1728 3504 RegSvcs.exe schtasks.exe PID 3504 wrote to memory of 1728 3504 RegSvcs.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe"C:\Users\Admin\AppData\Local\Temp\5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fukesTTIeEHYu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEEF6.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpEEF6.tmpMD5
5fb0a076ec20aab775f6b44ef5f3dfc5
SHA15c5a5ce49a5f7e4a0ed0a55b12c708aceeaa4f2a
SHA256bfe9e6b92ebec26694560a77cb6a82d0db284ac23664ed51352baf0c765361dd
SHA512ceca017ae6c05b8df942dc3f95c42ee747cfca1be4ecbad9ed7d8e93cdc986235276b5871935f3d4a599af6c4b0d4a3c85aebe31888fbb708caa527d829e5368
-
memory/948-115-0x0000000000DC0000-0x0000000000DFC000-memory.dmpFilesize
240KB
-
memory/948-116-0x0000000005C50000-0x000000000614E000-memory.dmpFilesize
5.0MB
-
memory/948-117-0x00000000057F0000-0x0000000005882000-memory.dmpFilesize
584KB
-
memory/948-118-0x0000000005750000-0x0000000005C4E000-memory.dmpFilesize
5.0MB
-
memory/948-119-0x0000000005960000-0x000000000596A000-memory.dmpFilesize
40KB
-
memory/948-120-0x0000000001800000-0x0000000001810000-memory.dmpFilesize
64KB
-
memory/948-121-0x0000000005BF0000-0x0000000005C12000-memory.dmpFilesize
136KB
-
memory/948-122-0x0000000007DB0000-0x0000000007E4C000-memory.dmpFilesize
624KB
-
memory/3504-124-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/3504-125-0x0000000004D60000-0x000000000525E000-memory.dmpFilesize
5.0MB