Analysis
-
max time kernel
165s -
max time network
164s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 03:37
Static task
static1
Behavioral task
behavioral1
Sample
a6c258af41ba4806e49fb1acff81567a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a6c258af41ba4806e49fb1acff81567a.exe
Resource
win10-en-20211208
General
-
Target
a6c258af41ba4806e49fb1acff81567a.exe
-
Size
259KB
-
MD5
a6c258af41ba4806e49fb1acff81567a
-
SHA1
8264f99a54cf67957decd9346bb6e0d3cc91af1e
-
SHA256
75ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
-
SHA512
f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
Malware Config
Extracted
njrat
v4.0
UziClicker
perpetual-pollution.auto.playit.gg:54523
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 1 IoCs
Processes:
WindowsUpdate.exepid process 1088 WindowsUpdate.exe -
Drops startup file 5 IoCs
Processes:
a6c258af41ba4806e49fb1acff81567a.exeWindowsUpdate.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk a6c258af41ba4806e49fb1acff81567a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk WindowsUpdate.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe WindowsUpdate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe WindowsUpdate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe attrib.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
WindowsUpdate.exea6c258af41ba4806e49fb1acff81567a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsUpdate.exe" a6c258af41ba4806e49fb1acff81567a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
WindowsUpdate.exedescription pid process Token: SeDebugPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe Token: 33 1088 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 1088 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a6c258af41ba4806e49fb1acff81567a.exeWindowsUpdate.exedescription pid process target process PID 3876 wrote to memory of 1088 3876 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 3876 wrote to memory of 1088 3876 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 3876 wrote to memory of 1088 3876 a6c258af41ba4806e49fb1acff81567a.exe WindowsUpdate.exe PID 3876 wrote to memory of 3960 3876 a6c258af41ba4806e49fb1acff81567a.exe attrib.exe PID 3876 wrote to memory of 3960 3876 a6c258af41ba4806e49fb1acff81567a.exe attrib.exe PID 3876 wrote to memory of 3960 3876 a6c258af41ba4806e49fb1acff81567a.exe attrib.exe PID 1088 wrote to memory of 2416 1088 WindowsUpdate.exe attrib.exe PID 1088 wrote to memory of 2416 1088 WindowsUpdate.exe attrib.exe PID 1088 wrote to memory of 2416 1088 WindowsUpdate.exe attrib.exe PID 1088 wrote to memory of 1136 1088 WindowsUpdate.exe attrib.exe PID 1088 wrote to memory of 1136 1088 WindowsUpdate.exe attrib.exe PID 1088 wrote to memory of 1136 1088 WindowsUpdate.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 2416 attrib.exe 3960 attrib.exe 1136 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6c258af41ba4806e49fb1acff81567a.exe"C:\Users\Admin\AppData\Local\Temp\a6c258af41ba4806e49fb1acff81567a.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"3⤵
- Views/modifies file attributes
PID:1136
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"3⤵
- Drops startup file
- Views/modifies file attributes
PID:2416
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"2⤵
- Views/modifies file attributes
PID:3960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a6c258af41ba4806e49fb1acff81567a
SHA18264f99a54cf67957decd9346bb6e0d3cc91af1e
SHA25675ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
SHA512f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
-
MD5
a6c258af41ba4806e49fb1acff81567a
SHA18264f99a54cf67957decd9346bb6e0d3cc91af1e
SHA25675ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
SHA512f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
-
MD5
a6c258af41ba4806e49fb1acff81567a
SHA18264f99a54cf67957decd9346bb6e0d3cc91af1e
SHA25675ab761cc1439789376140b0ce2baf9fd7f6090a4a177cfcffd6fae11ec93071
SHA512f21ced4af54da0041bea63316277726529f09af941effd34544d45d5a6e8e52e4eb3a515796715f85cbdd1d39be519ee4952812c10b064d577c4fb2fdcf1f31f
-
MD5
a57e7a83efd42e1db0b3da3066caca8d
SHA1e836d909497ed731a2c262eb98ae88a2870ebbef
SHA256e3c2774fef5875e7799060d23c600d5427e0d68f1732f31518d194ef05183cf0
SHA51271cdda2c6b43480e987247e15812f8f259c065450e1665870f8922c33fef9ec19f9e71550ebf1147b8dfc05099b545ef4d06fe7ce9255efaea07eaed35da6ac7
-
MD5
e90d0ea551063a0633015457b19482da
SHA13d010567d3947182318ae9792694487d8915bcca
SHA256f95007e1e191ec6c973cbe5fa3302043f41e35ed55ad8e5db6906ef35c49182b
SHA512a90c15cca8db565fc1d1d5ec2d2e4283d6771385649e9e4cc3af40fd8a1efd076def2a180f5dc31da9ba31e638e2b91bb47db6833eaecc86e2620ddd775f834e