Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 00:57
Static task
static1
Behavioral task
behavioral1
Sample
a1142dd58b658687a9dfc83bfb327dfb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a1142dd58b658687a9dfc83bfb327dfb.exe
Resource
win10v2004-en-20220113
General
-
Target
a1142dd58b658687a9dfc83bfb327dfb.exe
-
Size
85KB
-
MD5
a1142dd58b658687a9dfc83bfb327dfb
-
SHA1
cfc125408dd419fb9a9308e80d3c7091780a417e
-
SHA256
37fa414b1beac72d5693525b934478c64655b122948b0f5ce9a647b4b08a8554
-
SHA512
7e8b5caf291c35a29d8e03f8a9ec9950ac91fd9e32519961c0dd1564d8233f9abe76af39029d59ad5c5f71dd95c30e8f9fe201e344bd465a4a93eca7c6a3f18c
Malware Config
Extracted
njrat
im523
FFF
4.tcp.ngrok.io:10180
d6181fde73b7edf87857576171e471b0
-
reg_key
d6181fde73b7edf87857576171e471b0
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 2 IoCs
Processes:
1.exeRuntime Broker.exepid process 652 1.exe 1676 Runtime Broker.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
Runtime Broker.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d6181fde73b7edf87857576171e471b0.exe Runtime Broker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d6181fde73b7edf87857576171e471b0.exe Runtime Broker.exe -
Loads dropped DLL 2 IoCs
Processes:
a1142dd58b658687a9dfc83bfb327dfb.exe1.exepid process 1664 a1142dd58b658687a9dfc83bfb327dfb.exe 652 1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Runtime Broker.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\d6181fde73b7edf87857576171e471b0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\d6181fde73b7edf87857576171e471b0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Runtime Broker.exe\" .." Runtime Broker.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 864 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Runtime Broker.exepid process 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe 1676 Runtime Broker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Runtime Broker.exepid process 1676 Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
Runtime Broker.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1676 Runtime Broker.exe Token: SeDebugPrivilege 864 taskkill.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe Token: 33 1676 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1676 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
a1142dd58b658687a9dfc83bfb327dfb.exe1.exeRuntime Broker.exedescription pid process target process PID 1664 wrote to memory of 652 1664 a1142dd58b658687a9dfc83bfb327dfb.exe 1.exe PID 1664 wrote to memory of 652 1664 a1142dd58b658687a9dfc83bfb327dfb.exe 1.exe PID 1664 wrote to memory of 652 1664 a1142dd58b658687a9dfc83bfb327dfb.exe 1.exe PID 1664 wrote to memory of 652 1664 a1142dd58b658687a9dfc83bfb327dfb.exe 1.exe PID 652 wrote to memory of 1676 652 1.exe Runtime Broker.exe PID 652 wrote to memory of 1676 652 1.exe Runtime Broker.exe PID 652 wrote to memory of 1676 652 1.exe Runtime Broker.exe PID 652 wrote to memory of 1676 652 1.exe Runtime Broker.exe PID 1676 wrote to memory of 616 1676 Runtime Broker.exe netsh.exe PID 1676 wrote to memory of 616 1676 Runtime Broker.exe netsh.exe PID 1676 wrote to memory of 616 1676 Runtime Broker.exe netsh.exe PID 1676 wrote to memory of 616 1676 Runtime Broker.exe netsh.exe PID 1676 wrote to memory of 864 1676 Runtime Broker.exe taskkill.exe PID 1676 wrote to memory of 864 1676 Runtime Broker.exe taskkill.exe PID 1676 wrote to memory of 864 1676 Runtime Broker.exe taskkill.exe PID 1676 wrote to memory of 864 1676 Runtime Broker.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1142dd58b658687a9dfc83bfb327dfb.exe"C:\Users\Admin\AppData\Local\Temp\a1142dd58b658687a9dfc83bfb327dfb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" "Runtime Broker.exe" ENABLE4⤵PID:616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23