Analysis
-
max time kernel
4294211s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
28-03-2022 22:23
Static task
static1
Behavioral task
behavioral1
Sample
ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exe
Resource
win7-20220311-en
General
-
Target
ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exe
-
Size
229KB
-
MD5
7d276dfb51b873aa1fa8d512a961b8e7
-
SHA1
0070198c1e94602fdc435a5933990861e9d7836c
-
SHA256
ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20
-
SHA512
11f360bbe72a90c9364fb4f9d8d8659bb82d18745077cb85b08b158bbdabc05735f0b38a4710c42759d2bca23cbbebd0e77159228f8754ac7553ef1ccc05327e
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
system
urbanhuman123.duckdns.org:3131
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Tempwinlogon.exesystemupdate.exepid process 1724 Tempwinlogon.exe 840 systemupdate.exe -
Drops startup file 2 IoCs
Processes:
systemupdate.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Update.exe systemupdate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Update.exe systemupdate.exe -
Loads dropped DLL 1 IoCs
Processes:
Tempwinlogon.exepid process 1724 Tempwinlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
systemupdate.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\systemupdate.exe\" .." systemupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\systemupdate.exe\" .." systemupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Tempwinlogon.exesystemupdate.exepid process 1724 Tempwinlogon.exe 840 systemupdate.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
systemupdate.exedescription pid process Token: SeDebugPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe Token: 33 840 systemupdate.exe Token: SeIncBasePriorityPrivilege 840 systemupdate.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exewscript.exeTempwinlogon.exedescription pid process target process PID 2000 wrote to memory of 1624 2000 ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exe wscript.exe PID 2000 wrote to memory of 1624 2000 ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exe wscript.exe PID 2000 wrote to memory of 1624 2000 ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exe wscript.exe PID 1624 wrote to memory of 1724 1624 wscript.exe Tempwinlogon.exe PID 1624 wrote to memory of 1724 1624 wscript.exe Tempwinlogon.exe PID 1624 wrote to memory of 1724 1624 wscript.exe Tempwinlogon.exe PID 1624 wrote to memory of 1724 1624 wscript.exe Tempwinlogon.exe PID 1724 wrote to memory of 840 1724 Tempwinlogon.exe systemupdate.exe PID 1724 wrote to memory of 840 1724 Tempwinlogon.exe systemupdate.exe PID 1724 wrote to memory of 840 1724 Tempwinlogon.exe systemupdate.exe PID 1724 wrote to memory of 840 1724 Tempwinlogon.exe systemupdate.exe PID 1724 wrote to memory of 840 1724 Tempwinlogon.exe systemupdate.exe PID 1724 wrote to memory of 840 1724 Tempwinlogon.exe systemupdate.exe PID 1724 wrote to memory of 840 1724 Tempwinlogon.exe systemupdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exe"C:\Users\Admin\AppData\Local\Temp\ed2483ea2768ee40839a832f2e2771ea56c476a3622687e7b476aabb59f65d20.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\36C9.tmp\36CA.tmp\36CB.vbs //Nologo2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Tempwinlogon.exe"C:\Users\Admin\AppData\Local\Tempwinlogon.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\systemupdate.exe"C:\Users\Admin\AppData\Local\Temp\systemupdate.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp\36CA.tmp\36CB.vbsFilesize
175KB
MD5f9a5ce69bedccc0300a55805c53d5298
SHA1667b32641419b4d11deb03601fd6ac460fa61b70
SHA256e3dff2b35df20d4cc148d246bd9cef6848e37e768f55156de4e5eb40f82a9cab
SHA512530c86fee6cba3f4e3b390c8bed345dd11f2c1f10c5d51ed7de16bc90f90d85f887f99c8a6623ffd9e0c78fca38052994e7bbe2b068422c846228888ffbcd78b
-
C:\Users\Admin\AppData\Local\Temp\systemupdate.exeFilesize
43KB
MD501cd1273407dc0ac4979fcb85fd7c1b2
SHA12c6e2a2ffbe0c98cf378396f41059fb8f40afbed
SHA25680e24cd9cc94e7d896e564373a3145ea1dbb3252d5249b89a8d17470776edadc
SHA512b39e83caddb954a9f05cb14ecb5d813336fd5cb477aab91194f8fd631f6af274c3c17705d5fb38e4cf2c7c9096868661a294b46b3557292de4d92ece6251d640
-
C:\Users\Admin\AppData\Local\Temp\systemupdate.exeFilesize
43KB
MD501cd1273407dc0ac4979fcb85fd7c1b2
SHA12c6e2a2ffbe0c98cf378396f41059fb8f40afbed
SHA25680e24cd9cc94e7d896e564373a3145ea1dbb3252d5249b89a8d17470776edadc
SHA512b39e83caddb954a9f05cb14ecb5d813336fd5cb477aab91194f8fd631f6af274c3c17705d5fb38e4cf2c7c9096868661a294b46b3557292de4d92ece6251d640
-
C:\Users\Admin\AppData\Local\Tempwinlogon.exeFilesize
43KB
MD501cd1273407dc0ac4979fcb85fd7c1b2
SHA12c6e2a2ffbe0c98cf378396f41059fb8f40afbed
SHA25680e24cd9cc94e7d896e564373a3145ea1dbb3252d5249b89a8d17470776edadc
SHA512b39e83caddb954a9f05cb14ecb5d813336fd5cb477aab91194f8fd631f6af274c3c17705d5fb38e4cf2c7c9096868661a294b46b3557292de4d92ece6251d640
-
C:\Users\Admin\AppData\Local\Tempwinlogon.exeFilesize
43KB
MD501cd1273407dc0ac4979fcb85fd7c1b2
SHA12c6e2a2ffbe0c98cf378396f41059fb8f40afbed
SHA25680e24cd9cc94e7d896e564373a3145ea1dbb3252d5249b89a8d17470776edadc
SHA512b39e83caddb954a9f05cb14ecb5d813336fd5cb477aab91194f8fd631f6af274c3c17705d5fb38e4cf2c7c9096868661a294b46b3557292de4d92ece6251d640
-
\Users\Admin\AppData\Local\Temp\systemupdate.exeFilesize
43KB
MD501cd1273407dc0ac4979fcb85fd7c1b2
SHA12c6e2a2ffbe0c98cf378396f41059fb8f40afbed
SHA25680e24cd9cc94e7d896e564373a3145ea1dbb3252d5249b89a8d17470776edadc
SHA512b39e83caddb954a9f05cb14ecb5d813336fd5cb477aab91194f8fd631f6af274c3c17705d5fb38e4cf2c7c9096868661a294b46b3557292de4d92ece6251d640
-
memory/840-64-0x0000000000000000-mapping.dmp
-
memory/840-68-0x0000000074200000-0x00000000747AB000-memory.dmpFilesize
5.7MB
-
memory/1624-55-0x0000000000000000-mapping.dmp
-
memory/1724-58-0x0000000000000000-mapping.dmp
-
memory/1724-62-0x0000000074200000-0x00000000747AB000-memory.dmpFilesize
5.7MB
-
memory/1724-61-0x0000000074C61000-0x0000000074C63000-memory.dmpFilesize
8KB
-
memory/2000-54-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmpFilesize
8KB