Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 17:22
Static task
static1
Behavioral task
behavioral1
Sample
#461432638.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
#461432638.exe
Resource
win10-en-20211208
General
-
Target
#461432638.exe
-
Size
979KB
-
MD5
29bf474d20e0b17a36577c6e903e8afb
-
SHA1
11cf027edff4d91c634b23972c612a9998b7173f
-
SHA256
9ba526eaa176389b20e270129a403934a9625fdee27f1ad36ed20289f178421c
-
SHA512
bab8419ec4c686e01f173ee23a21c4345c8e2f0cf1bd32d7302993b0cdc513b897563f7bb14b589b7920aedec4c027d74fa8924c72a11c83884ddc5b74484cb4
Malware Config
Extracted
njrat
1.9
HacKed
Microsoft.Exe
-
reg_key
Microsoft.Exe
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
#461432638.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.Exe #461432638.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.Exe #461432638.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
#461432638.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\#461432638.exe\" .." #461432638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft.Exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\#461432638.exe\" .." #461432638.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
#461432638.exedescription pid process target process PID 2336 set thread context of 596 2336 #461432638.exe #461432638.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
#461432638.exepid process 2336 #461432638.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
#461432638.exe#461432638.exedescription pid process Token: SeDebugPrivilege 2336 #461432638.exe Token: SeDebugPrivilege 596 #461432638.exe Token: 33 596 #461432638.exe Token: SeIncBasePriorityPrivilege 596 #461432638.exe Token: 33 596 #461432638.exe Token: SeIncBasePriorityPrivilege 596 #461432638.exe Token: 33 596 #461432638.exe Token: SeIncBasePriorityPrivilege 596 #461432638.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
#461432638.exe#461432638.exedescription pid process target process PID 2336 wrote to memory of 1164 2336 #461432638.exe schtasks.exe PID 2336 wrote to memory of 1164 2336 #461432638.exe schtasks.exe PID 2336 wrote to memory of 1164 2336 #461432638.exe schtasks.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 2336 wrote to memory of 596 2336 #461432638.exe #461432638.exe PID 596 wrote to memory of 1176 596 #461432638.exe netsh.exe PID 596 wrote to memory of 1176 596 #461432638.exe netsh.exe PID 596 wrote to memory of 1176 596 #461432638.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\#461432638.exe"C:\Users\Admin\AppData\Local\Temp\#461432638.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NjGbuw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7D0C.tmp"2⤵
- Creates scheduled task(s)
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\#461432638.exe"{path}"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\#461432638.exe" "#461432638.exe" ENABLE3⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
90acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
MD5
5e8ac5638777d70286cc5f95a91397dc
SHA140eeac66685cd6e8b4d59a95d7d6ccfa551a67b8
SHA2561d488ae0d7666ef9d582115b0ff1caebb6769e81c90f506245232c6e5587aef8
SHA512bf83e07126aa171bf02a4b8b78b4007f40f52395599825e32f517c35b254db2e196fe37ca1074aba2c6a16501d865053db425d97eb6e0321d6d24ef4a75aa335