Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
25-01-2022 21:52
Static task
static1
Behavioral task
behavioral1
Sample
Ley N° (0080876540).exe
Resource
win7-en-20211208
General
-
Target
Ley N° (0080876540).exe
-
Size
670KB
-
MD5
c9bc2ade28395d0077523ecde62bf6ab
-
SHA1
aa815fa396dcc8549e5a1b39445b517c092acd72
-
SHA256
6ab420972ed80355eeb88e3f08d4e9124141012b6a25e4f2ed6c19235da10d21
-
SHA512
1aaca0dcc9974c14f2d724e3f507a86b4ccfe6b5932ceb9d0089774e32729f5ecb6e86f9742f803711f50aabf7e6f2d43c4ab2ce939abad2a553ac4699abac9e
Malware Config
Extracted
njrat
0.7.3
24-ene
googlemaintenanceservice.duckdns.org:7856
Client.exe
-
reg_key
Client.exe
-
splitter
ultimate
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Ley N° (0080876540).exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Ley N° (0080876540).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Ley N° (0080876540).exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Ley N° (0080876540).exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Ley N° (0080876540).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Ley N° (0080876540).exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ley N° (0080876540).exedescription pid process target process PID 1724 set thread context of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Ley N° (0080876540).exepowershell.exepowershell.exepid process 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1212 powershell.exe 1724 Ley N° (0080876540).exe 1620 powershell.exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe 1724 Ley N° (0080876540).exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
Ley N° (0080876540).exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1724 Ley N° (0080876540).exe Token: SeDebugPrivilege 1212 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe Token: SeDebugPrivilege 1128 RegSvcs.exe Token: 33 1128 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1128 RegSvcs.exe Token: 33 1128 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1128 RegSvcs.exe Token: 33 1128 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1128 RegSvcs.exe Token: 33 1128 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1128 RegSvcs.exe Token: 33 1128 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1128 RegSvcs.exe Token: 33 1128 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1128 RegSvcs.exe Token: 33 1128 RegSvcs.exe Token: SeIncBasePriorityPrivilege 1128 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
Ley N° (0080876540).exedescription pid process target process PID 1724 wrote to memory of 1212 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1212 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1212 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1212 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1620 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1620 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1620 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1620 1724 Ley N° (0080876540).exe powershell.exe PID 1724 wrote to memory of 1652 1724 Ley N° (0080876540).exe schtasks.exe PID 1724 wrote to memory of 1652 1724 Ley N° (0080876540).exe schtasks.exe PID 1724 wrote to memory of 1652 1724 Ley N° (0080876540).exe schtasks.exe PID 1724 wrote to memory of 1652 1724 Ley N° (0080876540).exe schtasks.exe PID 1724 wrote to memory of 832 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 832 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 832 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 832 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 832 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 832 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 832 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe PID 1724 wrote to memory of 1128 1724 Ley N° (0080876540).exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ley N° (0080876540).exe"C:\Users\Admin\AppData\Local\Temp\Ley N° (0080876540).exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Ley N° (0080876540).exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qnnHkykD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qnnHkykD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3A81.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3A81.tmpMD5
d4fc4ee6798011555cead5b93ec6e8e1
SHA166e0bea33d6e399c61cb754cbb71f40ea8c959f0
SHA25641ba7e862ba2b67b59146a15b8185d55057e48866a9d887c5e7fea07fb572ba9
SHA512f9ecfbfbb209d895fd5d78fe52b83a47cb1ffdee1861b4ed6bba1da3bf5e74082accda50f90f6c8dfb888fc9bd83a5f975582463ce29b8c78f4e5aee379ac523
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msMD5
ca053097fc41448ce16225d8c912ebcd
SHA148ba79dcf1bab24a46c9651d78e2f4fb0c13782a
SHA256e217059548f68b54b68930f1166bcb8ef9443a5ae708b175da159a4da54bda46
SHA512338a8beaee534fd9f9b6666901da11a344158bd27632475222fe6e30fc59b5276e02c80ff0b7bea47c6ea4c36931617737b078056c86f827ad95817d35e86d91
-
memory/1128-73-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1128-80-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/1128-78-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1128-76-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1128-77-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1128-75-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1128-74-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1212-63-0x0000000002320000-0x00000000025B0000-memory.dmpFilesize
2.6MB
-
memory/1212-64-0x0000000002320000-0x00000000025B0000-memory.dmpFilesize
2.6MB
-
memory/1620-70-0x0000000002500000-0x000000000314A000-memory.dmpFilesize
12.3MB
-
memory/1620-72-0x0000000002500000-0x000000000314A000-memory.dmpFilesize
12.3MB
-
memory/1620-71-0x0000000002500000-0x000000000314A000-memory.dmpFilesize
12.3MB
-
memory/1724-54-0x0000000001020000-0x00000000010CE000-memory.dmpFilesize
696KB
-
memory/1724-59-0x0000000000CC0000-0x0000000000D02000-memory.dmpFilesize
264KB
-
memory/1724-58-0x0000000000430000-0x000000000043E000-memory.dmpFilesize
56KB
-
memory/1724-57-0x000000007EF40000-0x000000007EF41000-memory.dmpFilesize
4KB
-
memory/1724-56-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/1724-55-0x0000000076491000-0x0000000076493000-memory.dmpFilesize
8KB