Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 21:44
Behavioral task
behavioral1
Sample
bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe
Resource
win7-20220414-en
General
-
Target
bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe
-
Size
37KB
-
MD5
d4ae130ffb524a176b0f218ec461a32f
-
SHA1
41fae0afe0d112bed49658f9bde1191e90990138
-
SHA256
bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8
-
SHA512
a0ca2ef49f25e713aa30d57ed3b2402bc399e2753c0942611613ff20ff96a44c38f641994d39b740bd5216201947f3a96459d52d8c1bc669bd0bbcd16ddeadfe
Malware Config
Extracted
njrat
im523
KRIC
192.168.1.130:5552
cdffbb02e1916328f4aa20d5c638f039
-
reg_key
cdffbb02e1916328f4aa20d5c638f039
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Java.exepid process 1968 Java.exe -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exepid process 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
Java.exedescription pid process Token: SeDebugPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe Token: 33 1968 Java.exe Token: SeIncBasePriorityPrivilege 1968 Java.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exeJava.exedescription pid process target process PID 384 wrote to memory of 1968 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe Java.exe PID 384 wrote to memory of 1968 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe Java.exe PID 384 wrote to memory of 1968 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe Java.exe PID 384 wrote to memory of 1968 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe Java.exe PID 384 wrote to memory of 1968 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe Java.exe PID 384 wrote to memory of 1968 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe Java.exe PID 384 wrote to memory of 1968 384 bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe Java.exe PID 1968 wrote to memory of 2036 1968 Java.exe netsh.exe PID 1968 wrote to memory of 2036 1968 Java.exe netsh.exe PID 1968 wrote to memory of 2036 1968 Java.exe netsh.exe PID 1968 wrote to memory of 2036 1968 Java.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe"C:\Users\Admin\AppData\Local\Temp\bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Java.exe"C:\Users\Admin\AppData\Local\Temp\Java.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Java.exe" "Java.exe" ENABLE3⤵PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5d4ae130ffb524a176b0f218ec461a32f
SHA141fae0afe0d112bed49658f9bde1191e90990138
SHA256bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8
SHA512a0ca2ef49f25e713aa30d57ed3b2402bc399e2753c0942611613ff20ff96a44c38f641994d39b740bd5216201947f3a96459d52d8c1bc669bd0bbcd16ddeadfe
-
Filesize
37KB
MD5d4ae130ffb524a176b0f218ec461a32f
SHA141fae0afe0d112bed49658f9bde1191e90990138
SHA256bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8
SHA512a0ca2ef49f25e713aa30d57ed3b2402bc399e2753c0942611613ff20ff96a44c38f641994d39b740bd5216201947f3a96459d52d8c1bc669bd0bbcd16ddeadfe
-
Filesize
37KB
MD5d4ae130ffb524a176b0f218ec461a32f
SHA141fae0afe0d112bed49658f9bde1191e90990138
SHA256bf01bd6b7f7aa984e24d4e1ad2bb56a422d7bf1f609256d5094020d8ff887dc8
SHA512a0ca2ef49f25e713aa30d57ed3b2402bc399e2753c0942611613ff20ff96a44c38f641994d39b740bd5216201947f3a96459d52d8c1bc669bd0bbcd16ddeadfe