Overview
overview
10Static
static
101.exe
windows7_x64
61.exe
windows10-2004_x64
610.exe
windows7_x64
1010.exe
windows10-2004_x64
102.doc
windows7_x64
102.doc
windows10-2004_x64
13.xlsx
windows7_x64
103.xlsx
windows10-2004_x64
14.exe
windows7_x64
104.exe
windows10-2004_x64
15.exe
windows7_x64
105.exe
windows10-2004_x64
16.exe
windows7_x64
106.exe
windows10-2004_x64
107.exe
windows7_x64
107.exe
windows10-2004_x64
18.exe
windows7_x64
108.exe
windows10-2004_x64
109.docm
windows7_x64
109.docm
windows10-2004_x64
10rip.bat
windows7_x64
10rip.bat
windows10-2004_x64
10Analysis
-
max time kernel
4294225s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
23-03-2022 21:00
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
10.exe
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
10.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
2.doc
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
2.doc
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
3.xlsx
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
3.xlsx
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
4.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
5.exe
Resource
win7-20220310-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
6.exe
Resource
win7-20220310-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
7.exe
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
7.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral17
Sample
8.exe
Resource
win7-20220311-en
Behavioral task
behavioral18
Sample
8.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral19
Sample
9.docm
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
9.docm
Resource
win10v2004-en-20220113
Behavioral task
behavioral21
Sample
rip.bat
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
rip.bat
Resource
win10v2004-en-20220113
General
-
Target
5.exe
Malware Config
Extracted
njrat
im523
Bot
DanilWhiteNjrat-57320.portmap.host:57320
802f813d3810aa536753efbd3390b541
-
reg_key
802f813d3810aa536753efbd3390b541
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1136 system.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\802f813d3810aa536753efbd3390b541.exe system.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\802f813d3810aa536753efbd3390b541.exe system.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Run\802f813d3810aa536753efbd3390b541 = "\"C:\\ProgramData\\system.exe\" .." system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\802f813d3810aa536753efbd3390b541 = "\"C:\\ProgramData\\system.exe\" .." system.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe Token: 33 1136 system.exe Token: SeIncBasePriorityPrivilege 1136 system.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1136 1660 5.exe 29 PID 1660 wrote to memory of 1136 1660 5.exe 29 PID 1660 wrote to memory of 1136 1660 5.exe 29 PID 1660 wrote to memory of 1136 1660 5.exe 29 PID 1136 wrote to memory of 2024 1136 system.exe 30 PID 1136 wrote to memory of 2024 1136 system.exe 30 PID 1136 wrote to memory of 2024 1136 system.exe 30 PID 1136 wrote to memory of 2024 1136 system.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\ProgramData\system.exe"C:\ProgramData\system.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\system.exe" "system.exe" ENABLE3⤵PID:2024
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5e817d74d13c658890ff3a4c01ab44c62
SHA1bf0b97392e7d56eee0b63dc65efff4db883cb0c7
SHA2562945881f15e98a18d27108a29963988190853838f34faf3020e6c3c97342672d
SHA5128d90ef308c1e0b7e01e7732e2cd819f07bfc1ef06e523efa81694ced75550c9f1be460fc9de412faeb96273a6492580402ab9c9538ed441fc26d96b6785e7815
-
Filesize
37KB
MD5e817d74d13c658890ff3a4c01ab44c62
SHA1bf0b97392e7d56eee0b63dc65efff4db883cb0c7
SHA2562945881f15e98a18d27108a29963988190853838f34faf3020e6c3c97342672d
SHA5128d90ef308c1e0b7e01e7732e2cd819f07bfc1ef06e523efa81694ced75550c9f1be460fc9de412faeb96273a6492580402ab9c9538ed441fc26d96b6785e7815
-
Filesize
37KB
MD5e817d74d13c658890ff3a4c01ab44c62
SHA1bf0b97392e7d56eee0b63dc65efff4db883cb0c7
SHA2562945881f15e98a18d27108a29963988190853838f34faf3020e6c3c97342672d
SHA5128d90ef308c1e0b7e01e7732e2cd819f07bfc1ef06e523efa81694ced75550c9f1be460fc9de412faeb96273a6492580402ab9c9538ed441fc26d96b6785e7815