Analysis

  • max time kernel
    92s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    10-03-2022 23:57

General

  • Target

    3f16985a58d42af0b56b8cbcefbfea709d32b3041633c4037f4d46cddb6b16e6.exe

  • Size

    2.1MB

  • MD5

    c0d3b6f38e5253f59f2f15cdcf14edf0

  • SHA1

    4442c0d76b86470ebd8d8cea91382107ff9ad96d

  • SHA256

    3f16985a58d42af0b56b8cbcefbfea709d32b3041633c4037f4d46cddb6b16e6

  • SHA512

    578d245a5e7444a741d946dd20b7e9506ac7436ed08132af7549d12f293b9e92d9c3c7174284c92a7a8802211799dc09847f3428c758da0632c471b3aa80e696

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacK

C2

127.0.0.1:1234

Mutex

8a6179254fb2f1e73fe707c1a92f1876

Attributes
  • reg_key

    8a6179254fb2f1e73fe707c1a92f1876

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Nirsoft 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f16985a58d42af0b56b8cbcefbfea709d32b3041633c4037f4d46cddb6b16e6.exe
    "C:\Users\Admin\AppData\Local\Temp\3f16985a58d42af0b56b8cbcefbfea709d32b3041633c4037f4d46cddb6b16e6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Windows\SysWOW64\fondue.exe
        "C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Windows\system32\FonDUE.EXE
          "C:\Windows\sysnative\FonDUE.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll
          4⤵
            PID:1432
      • C:\Users\Admin\AppData\Local\Temp\Process Modules DLL.exe
        "C:\Users\Admin\AppData\Local\Temp\Process Modules DLL.exe"
        2⤵
        • Executes dropped EXE
        PID:448
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x33c 0x3fc
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3348

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Process Modules DLL.exe
      MD5

      d27ba7e620a8c3a36b62d3a983d3fe61

      SHA1

      ac86faf6c358002254a032d4f7a9bdbef093c573

      SHA256

      3d793d0f14382c8f28ba9efd2f35bfb18c2abaf5f4654d81726ddebe4310fa07

      SHA512

      e0ef5dac3c50fe6bf1e03116dd7239d89c85d0a47bf2254705c1f4527b1b4843cc5b04ed76d5f618a61f127c6b54587e2e02f7050525d819f6aa3b93ede91a00

    • C:\Users\Admin\AppData\Local\Temp\Process Modules DLL.exe
      MD5

      d27ba7e620a8c3a36b62d3a983d3fe61

      SHA1

      ac86faf6c358002254a032d4f7a9bdbef093c573

      SHA256

      3d793d0f14382c8f28ba9efd2f35bfb18c2abaf5f4654d81726ddebe4310fa07

      SHA512

      e0ef5dac3c50fe6bf1e03116dd7239d89c85d0a47bf2254705c1f4527b1b4843cc5b04ed76d5f618a61f127c6b54587e2e02f7050525d819f6aa3b93ede91a00

    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      MD5

      cd756c506aedc1507c79b7c81d51dfe0

      SHA1

      0428b30df265076b61499266050ecbb461b1ae95

      SHA256

      3a06815118520f21257729a0ef3a86159f927a9b0f598f442fc2b699b9a8adff

      SHA512

      9fde72774fd3deba541c69e37343a10e600f6bf4c5111b670397d4740d4d5405c7ba4b0436d12fc796c3662381ec62b226e6801685f5eff75cc7df069bd1f062

    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      MD5

      cd756c506aedc1507c79b7c81d51dfe0

      SHA1

      0428b30df265076b61499266050ecbb461b1ae95

      SHA256

      3a06815118520f21257729a0ef3a86159f927a9b0f598f442fc2b699b9a8adff

      SHA512

      9fde72774fd3deba541c69e37343a10e600f6bf4c5111b670397d4740d4d5405c7ba4b0436d12fc796c3662381ec62b226e6801685f5eff75cc7df069bd1f062

    • memory/448-134-0x0000000000B00000-0x0000000000BFC000-memory.dmp
      Filesize

      1008KB

    • memory/448-135-0x00007FFC4E0E0000-0x00007FFC4EBA1000-memory.dmp
      Filesize

      10.8MB

    • memory/448-136-0x000000001CD30000-0x000000001CD32000-memory.dmp
      Filesize

      8KB

    • memory/448-137-0x000000001CD33000-0x000000001CD35000-memory.dmp
      Filesize

      8KB