Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 03:37
Static task
static1
Behavioral task
behavioral1
Sample
a6c258af41ba4806e49fb1acff81567a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a6c258af41ba4806e49fb1acff81567a.exe
Resource
win10-en-20211208
General
-
Target
a6c258af41ba4806e49fb1acff81567a.exe
-
Size
259KB
-
MD5
a6c258af41ba4806e49fb1acff81567a
-
SHA1
8264f99a54cf67957decd9346bb6e0d3cc91af1e
-
SHA256
75ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
-
SHA512
f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
Malware Config
Extracted
njrat
v4.0
UziClicker
perpetual-pollution.auto.playit.gg:54523
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 1 IoCs
Processes:
WindowsUpdate.exepid process 268 WindowsUpdate.exe -
Drops startup file 5 IoCs
Processes:
a6c258af41ba4806e49fb1acff81567a.exeWindowsUpdate.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk a6c258af41ba4806e49fb1acff81567a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk WindowsUpdate.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe WindowsUpdate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe WindowsUpdate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe attrib.exe -
Loads dropped DLL 1 IoCs
Processes:
a6c258af41ba4806e49fb1acff81567a.exepid process 1724 a6c258af41ba4806e49fb1acff81567a.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
a6c258af41ba4806e49fb1acff81567a.exeWindowsUpdate.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsUpdate.exe" a6c258af41ba4806e49fb1acff81567a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
WindowsUpdate.exedescription pid process Token: SeDebugPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe Token: 33 268 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 268 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
a6c258af41ba4806e49fb1acff81567a.exeWindowsUpdate.exedescription pid process target process PID 1724 wrote to memory of 268 1724 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 1724 wrote to memory of 268 1724 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 1724 wrote to memory of 268 1724 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 1724 wrote to memory of 268 1724 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 1724 wrote to memory of 268 1724 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 1724 wrote to memory of 268 1724 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 1724 wrote to memory of 268 1724 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 1724 wrote to memory of 704 1724 a6c258af41ba4806e49fb1acff81567a.exe attrib.exe PID 1724 wrote to memory of 704 1724 a6c258af41ba4806e49fb1acff81567a.exe attrib.exe PID 1724 wrote to memory of 704 1724 a6c258af41ba4806e49fb1acff81567a.exe attrib.exe PID 1724 wrote to memory of 704 1724 a6c258af41ba4806e49fb1acff81567a.exe attrib.exe PID 268 wrote to memory of 452 268 WindowsUpdate.exe attrib.exe PID 268 wrote to memory of 452 268 WindowsUpdate.exe attrib.exe PID 268 wrote to memory of 452 268 WindowsUpdate.exe attrib.exe PID 268 wrote to memory of 452 268 WindowsUpdate.exe attrib.exe PID 268 wrote to memory of 1188 268 WindowsUpdate.exe attrib.exe PID 268 wrote to memory of 1188 268 WindowsUpdate.exe attrib.exe PID 268 wrote to memory of 1188 268 WindowsUpdate.exe attrib.exe PID 268 wrote to memory of 1188 268 WindowsUpdate.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 452 attrib.exe 1188 attrib.exe 704 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6c258af41ba4806e49fb1acff81567a.exe"C:\Users\Admin\AppData\Local\Temp\a6c258af41ba4806e49fb1acff81567a.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"3⤵
- Drops startup file
- Views/modifies file attributes
PID:452
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"3⤵
- Views/modifies file attributes
PID:1188
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"2⤵
- Views/modifies file attributes
PID:704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a6c258af41ba4806e49fb1acff81567a
SHA18264f99a54cf67957decd9346bb6e0d3cc91af1e
SHA25675ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
SHA512f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
-
MD5
a6c258af41ba4806e49fb1acff81567a
SHA18264f99a54cf67957decd9346bb6e0d3cc91af1e
SHA25675ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
SHA512f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
-
MD5
a6c258af41ba4806e49fb1acff81567a
SHA18264f99a54cf67957decd9346bb6e0d3cc91af1e
SHA25675ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
SHA512f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
-
MD5
74e0513f71ef18aae509f7751f25f453
SHA1aba9ff8944c79d81c9f38337722c89a733712b4b
SHA256a46f531044be1b29ac6346aa39fd048b19e8c799de2484d9978ee79cc96c8e8b
SHA512a8b47c292d7be35d560787c39978ad54ff7f7bd273a9db550b9795fc8a5666244397fa6e0f2888dcc4811550090acee479d0176e01965bea80598f10e971abd0
-
MD5
ce86a5f1ef5c036da720d8cba98512e7
SHA1530e6d5ae5b1ec43fa9c337afa18f34c49681558
SHA2562250c04d4c5b334c97fe69ba67021d1131e73746f96d9939745d7714472cce6d
SHA51257b300c44f312c6d9e13c56e24ebdb89398458256af18e3a2aa090d84e2d922ad86e2980d5c91015ca7255749d6be3cc042fb41f76a75f383cdffc83528583e9
-
MD5
a6c258af41ba4806e49fb1acff81567a
SHA18264f99a54cf67957decd9346bb6e0d3cc91af1e
SHA25675ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
SHA512f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f