Analysis

  • max time kernel
    4294211s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    23-03-2022 09:28

General

  • Target

    93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f.exe

  • Size

    666KB

  • MD5

    92493532531788040b78f62f00c1d5d6

  • SHA1

    e9a348440a7c42b4b9416830dba158f2c51fa68f

  • SHA256

    93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f

  • SHA512

    b0b6e704ff091318de64a05ce66a029831cb091d95257b184486b5369d22369cc1121a6eff304abce254ad760ba29dbc7cfcb2cd12261a50050e7728415ff818

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/947445080342556692/k5eX_haEP42zYxqA0vzh33TmF53CrHI3NFO_LEsqnIXkOW8GqH66QMKAvOSZ3Fkkfhjh

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:25565

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f.exe
    "C:\Users\Admin\AppData\Local\Temp\93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Users\Admin\AppData\Local\Temp\csgo.exe
        "C:\Users\Admin\AppData\Local\Temp\csgo.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:760
    • C:\Users\Admin\AppData\Local\Temp\OUPPO.exe
      "C:\Users\Admin\AppData\Local\Temp\OUPPO.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:872
    • C:\Users\Admin\AppData\Local\Temp\Insidious.exe
      "C:\Users\Admin\AppData\Local\Temp\Insidious.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:560

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Insidious.exe
    MD5

    818467636d598a4dc6fc6d89de7a9e57

    SHA1

    cb4bf08a35cf6e586bf76753fff1f43e1d61b4ca

    SHA256

    de55d02511c1d6b3b339299ec904b2a3605405e136d5d76b3b3d0d3818be25ea

    SHA512

    fe34c0ca523ae41f6ac41000f124a703f9fdfd949b80165f43898880d87be9a92c0aaca6ebc2acdea90a183e5c34bf906ceb290450d10bc5bdf86df6ba19034e

  • C:\Users\Admin\AppData\Local\Temp\Insidious.exe
    MD5

    818467636d598a4dc6fc6d89de7a9e57

    SHA1

    cb4bf08a35cf6e586bf76753fff1f43e1d61b4ca

    SHA256

    de55d02511c1d6b3b339299ec904b2a3605405e136d5d76b3b3d0d3818be25ea

    SHA512

    fe34c0ca523ae41f6ac41000f124a703f9fdfd949b80165f43898880d87be9a92c0aaca6ebc2acdea90a183e5c34bf906ceb290450d10bc5bdf86df6ba19034e

  • C:\Users\Admin\AppData\Local\Temp\OUPPO.exe
    MD5

    bf9e924aaf11a12005d2f2d36ac87441

    SHA1

    b78f005f558deea3beab17d4062fe50d40576822

    SHA256

    5a5fba380366ce98b4b040b2f3186dd18da4d27f67a0627e2b6f5230d4059261

    SHA512

    e4323d7b1242849167ff7d8fa1c5361b4b9c7a9e5240f5683aef7396ec132e005094032a0c6ddc8904e9e98a92d27947a7a65bd3d21e006f449480f0cb11e9b2

  • C:\Users\Admin\AppData\Local\Temp\OUPPO.exe
    MD5

    bf9e924aaf11a12005d2f2d36ac87441

    SHA1

    b78f005f558deea3beab17d4062fe50d40576822

    SHA256

    5a5fba380366ce98b4b040b2f3186dd18da4d27f67a0627e2b6f5230d4059261

    SHA512

    e4323d7b1242849167ff7d8fa1c5361b4b9c7a9e5240f5683aef7396ec132e005094032a0c6ddc8904e9e98a92d27947a7a65bd3d21e006f449480f0cb11e9b2

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    de4d468220008d0050ab60cd0091177c

    SHA1

    cbdd291fa512b43ef9a1a572c4d5f6c1ea590ada

    SHA256

    0cb50e1f328aa44d13490a50408c8f73a0f464fc895219748edeec58335f03ee

    SHA512

    ff58acfd1dcc7ec73aea3f13cd97033fd79eaeeb48dd77f484458dbc2378000d2229810e0eb61d0362b92214bad275c5258846f59016414fed457c7727451ca4

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    de4d468220008d0050ab60cd0091177c

    SHA1

    cbdd291fa512b43ef9a1a572c4d5f6c1ea590ada

    SHA256

    0cb50e1f328aa44d13490a50408c8f73a0f464fc895219748edeec58335f03ee

    SHA512

    ff58acfd1dcc7ec73aea3f13cd97033fd79eaeeb48dd77f484458dbc2378000d2229810e0eb61d0362b92214bad275c5258846f59016414fed457c7727451ca4

  • C:\Users\Admin\AppData\Local\Temp\csgo.exe
    MD5

    de4d468220008d0050ab60cd0091177c

    SHA1

    cbdd291fa512b43ef9a1a572c4d5f6c1ea590ada

    SHA256

    0cb50e1f328aa44d13490a50408c8f73a0f464fc895219748edeec58335f03ee

    SHA512

    ff58acfd1dcc7ec73aea3f13cd97033fd79eaeeb48dd77f484458dbc2378000d2229810e0eb61d0362b92214bad275c5258846f59016414fed457c7727451ca4

  • C:\Users\Admin\AppData\Local\Temp\csgo.exe
    MD5

    de4d468220008d0050ab60cd0091177c

    SHA1

    cbdd291fa512b43ef9a1a572c4d5f6c1ea590ada

    SHA256

    0cb50e1f328aa44d13490a50408c8f73a0f464fc895219748edeec58335f03ee

    SHA512

    ff58acfd1dcc7ec73aea3f13cd97033fd79eaeeb48dd77f484458dbc2378000d2229810e0eb61d0362b92214bad275c5258846f59016414fed457c7727451ca4

  • \Users\Admin\AppData\Local\Temp\Insidious.exe
    MD5

    818467636d598a4dc6fc6d89de7a9e57

    SHA1

    cb4bf08a35cf6e586bf76753fff1f43e1d61b4ca

    SHA256

    de55d02511c1d6b3b339299ec904b2a3605405e136d5d76b3b3d0d3818be25ea

    SHA512

    fe34c0ca523ae41f6ac41000f124a703f9fdfd949b80165f43898880d87be9a92c0aaca6ebc2acdea90a183e5c34bf906ceb290450d10bc5bdf86df6ba19034e

  • \Users\Admin\AppData\Local\Temp\OUPPO.exe
    MD5

    bf9e924aaf11a12005d2f2d36ac87441

    SHA1

    b78f005f558deea3beab17d4062fe50d40576822

    SHA256

    5a5fba380366ce98b4b040b2f3186dd18da4d27f67a0627e2b6f5230d4059261

    SHA512

    e4323d7b1242849167ff7d8fa1c5361b4b9c7a9e5240f5683aef7396ec132e005094032a0c6ddc8904e9e98a92d27947a7a65bd3d21e006f449480f0cb11e9b2

  • \Users\Admin\AppData\Local\Temp\Server.exe
    MD5

    de4d468220008d0050ab60cd0091177c

    SHA1

    cbdd291fa512b43ef9a1a572c4d5f6c1ea590ada

    SHA256

    0cb50e1f328aa44d13490a50408c8f73a0f464fc895219748edeec58335f03ee

    SHA512

    ff58acfd1dcc7ec73aea3f13cd97033fd79eaeeb48dd77f484458dbc2378000d2229810e0eb61d0362b92214bad275c5258846f59016414fed457c7727451ca4

  • \Users\Admin\AppData\Local\Temp\csgo.exe
    MD5

    de4d468220008d0050ab60cd0091177c

    SHA1

    cbdd291fa512b43ef9a1a572c4d5f6c1ea590ada

    SHA256

    0cb50e1f328aa44d13490a50408c8f73a0f464fc895219748edeec58335f03ee

    SHA512

    ff58acfd1dcc7ec73aea3f13cd97033fd79eaeeb48dd77f484458dbc2378000d2229810e0eb61d0362b92214bad275c5258846f59016414fed457c7727451ca4

  • memory/560-70-0x00000000008F0000-0x000000000093A000-memory.dmp
    Filesize

    296KB

  • memory/560-71-0x00000000004C0000-0x00000000004C2000-memory.dmp
    Filesize

    8KB

  • memory/560-65-0x0000000000000000-mapping.dmp
  • memory/760-74-0x0000000000000000-mapping.dmp
  • memory/760-77-0x0000000000FE0000-0x0000000000FF2000-memory.dmp
    Filesize

    72KB

  • memory/872-68-0x00000000011C0000-0x00000000011E4000-memory.dmp
    Filesize

    144KB

  • memory/872-61-0x0000000000000000-mapping.dmp
  • memory/872-72-0x0000000000FF5000-0x0000000001006000-memory.dmp
    Filesize

    68KB

  • memory/1824-57-0x0000000000000000-mapping.dmp
  • memory/1824-69-0x0000000000FC0000-0x0000000000FD2000-memory.dmp
    Filesize

    72KB

  • memory/2032-54-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/2032-55-0x0000000075801000-0x0000000075803000-memory.dmp
    Filesize

    8KB