Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
21-01-2022 00:57
Static task
static1
Behavioral task
behavioral1
Sample
a1142dd58b658687a9dfc83bfb327dfb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a1142dd58b658687a9dfc83bfb327dfb.exe
Resource
win10v2004-en-20220113
General
-
Target
a1142dd58b658687a9dfc83bfb327dfb.exe
-
Size
85KB
-
MD5
a1142dd58b658687a9dfc83bfb327dfb
-
SHA1
cfc125408dd419fb9a9308e80d3c7091780a417e
-
SHA256
37fa414b1beac72d5693525b934478c64655b122948b0f5ce9a647b4b08a8554
-
SHA512
7e8b5caf291c35a29d8e03f8a9ec9950ac91fd9e32519961c0dd1564d8233f9abe76af39029d59ad5c5f71dd95c30e8f9fe201e344bd465a4a93eca7c6a3f18c
Malware Config
Extracted
njrat
im523
FFF
4.tcp.ngrok.io:10180
d6181fde73b7edf87857576171e471b0
-
reg_key
d6181fde73b7edf87857576171e471b0
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
1.exepid process 3044 1.exe -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a1142dd58b658687a9dfc83bfb327dfb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation a1142dd58b658687a9dfc83bfb327dfb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a1142dd58b658687a9dfc83bfb327dfb.exe1.exefondue.exedescription pid process target process PID 552 wrote to memory of 3044 552 a1142dd58b658687a9dfc83bfb327dfb.exe 1.exe PID 552 wrote to memory of 3044 552 a1142dd58b658687a9dfc83bfb327dfb.exe 1.exe PID 552 wrote to memory of 3044 552 a1142dd58b658687a9dfc83bfb327dfb.exe 1.exe PID 3044 wrote to memory of 2984 3044 1.exe fondue.exe PID 3044 wrote to memory of 2984 3044 1.exe fondue.exe PID 3044 wrote to memory of 2984 3044 1.exe fondue.exe PID 2984 wrote to memory of 680 2984 fondue.exe FonDUE.EXE PID 2984 wrote to memory of 680 2984 fondue.exe FonDUE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1142dd58b658687a9dfc83bfb327dfb.exe"C:\Users\Admin\AppData\Local\Temp\a1142dd58b658687a9dfc83bfb327dfb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\fondue.exe"C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll3⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\FonDUE.EXE"C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll4⤵PID:680
-
-
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 322ecc389b030b8538cf444877110ff7 OyQSP8GB3k6g8dF79Y3/hA.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:3508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23
-
MD5
e0cacf3b4629d583074d0fc5b436b232
SHA10755c4b3e43fd01e21e2114b780b1ee802dce051
SHA256352706f0e258388d65b9eff51e4c7965d9b276552ae06878da5b1422607885df
SHA512a6728e2f4a7cd76e2d90725722907a0ea51f2507b67251667181a2ca9052e82685a729b0d00b6b48f01058db69d69e310025dd79bb7bc7bdbe3784d991d49f23