Analysis

  • max time kernel
    151s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 20:12

General

  • Target

    3f330d95bd8bf7c71809189a1aa5285fea9d63fc7d193cda4b827e04bfa16bb3.vbs

  • Size

    188KB

  • MD5

    3b293d74827ff906a5ca3a4e4439e98f

  • SHA1

    76d14a79e2be1543ab79873e7b87f0deee8aad17

  • SHA256

    3f330d95bd8bf7c71809189a1aa5285fea9d63fc7d193cda4b827e04bfa16bb3

  • SHA512

    255295a70314398b0b96d4408f0606d385773accd0d5811cb697ff4f80b58c15f600ef9f18e17b09edfab9879541e6104fc759343cd36e1ed609899598a62d8a

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

|Erica|

C2

drpc.duckdns.org:1414

Mutex

48d74fcafbfa01ee33743b0d0ea39495

Attributes
  • reg_key

    48d74fcafbfa01ee33743b0d0ea39495

  • splitter

    TOP

Signatures

  • Registers COM server for autorun 1 TTPs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3f330d95bd8bf7c71809189a1aa5285fea9d63fc7d193cda4b827e04bfa16bb3.vbs"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\SYSWOW64\WSCRIPT.EXE
      "C:\Windows\SYSWOW64\WSCRIPT.EXE" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\3f330d95bd8bf7c71809189a1aa5285fea9d63fc7d193cda4b827e04bfa16bb3.vbs"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\google.vbs.BIN"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:1232
      • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
        "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE" "MSBUILD.EXE" ENABLE
          4⤵
            PID:844

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\google.vbs

      MD5

      3b293d74827ff906a5ca3a4e4439e98f

      SHA1

      76d14a79e2be1543ab79873e7b87f0deee8aad17

      SHA256

      3f330d95bd8bf7c71809189a1aa5285fea9d63fc7d193cda4b827e04bfa16bb3

      SHA512

      255295a70314398b0b96d4408f0606d385773accd0d5811cb697ff4f80b58c15f600ef9f18e17b09edfab9879541e6104fc759343cd36e1ed609899598a62d8a

    • C:\Users\Admin\AppData\Local\Temp\google.vbs.BIN

      MD5

      e0b8dfd17b8e7de760b273d18e58b142

      SHA1

      801509fb6783c9e57edc67a72dde3c62080ffbaf

      SHA256

      4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

      SHA512

      443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google.vbs.vbs

      MD5

      3b293d74827ff906a5ca3a4e4439e98f

      SHA1

      76d14a79e2be1543ab79873e7b87f0deee8aad17

      SHA256

      3f330d95bd8bf7c71809189a1aa5285fea9d63fc7d193cda4b827e04bfa16bb3

      SHA512

      255295a70314398b0b96d4408f0606d385773accd0d5811cb697ff4f80b58c15f600ef9f18e17b09edfab9879541e6104fc759343cd36e1ed609899598a62d8a

    • \Users\Admin\AppData\Local\Temp\google.vbs.BIN

      MD5

      e0b8dfd17b8e7de760b273d18e58b142

      SHA1

      801509fb6783c9e57edc67a72dde3c62080ffbaf

      SHA256

      4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

      SHA512

      443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

    • \Users\Admin\AppData\Local\Temp\google.vbs.BIN

      MD5

      e0b8dfd17b8e7de760b273d18e58b142

      SHA1

      801509fb6783c9e57edc67a72dde3c62080ffbaf

      SHA256

      4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

      SHA512

      443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

    • memory/608-71-0x00000000756C1000-0x00000000756C3000-memory.dmp

      Filesize

      8KB

    • memory/608-79-0x0000000000650000-0x0000000000651000-memory.dmp

      Filesize

      4KB

    • memory/1320-81-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1320-80-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1320-83-0x0000000000490000-0x0000000000491000-memory.dmp

      Filesize

      4KB