Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 21:56

General

  • Target

    3c3a76b613083c05bb7db61c6b359870c2e90352076f2d32a9c96061494bab99.exe

  • Size

    37KB

  • MD5

    da41705c070ddbe50b4774857de19a74

  • SHA1

    8871c7ce68dde674da05339f3a6d6d0eefb0bcb0

  • SHA256

    3c3a76b613083c05bb7db61c6b359870c2e90352076f2d32a9c96061494bab99

  • SHA512

    c1de464d1f2a3fb5bc95fb615f8909e8889383112691f10263d1bdf1aee94228c527d09caa195f6f40fe92e76cff0fb7eb679420390269e412f72143b0a30e9b

Malware Config

Extracted

Family

njrat

Version

im523

C2

79.140.166.40:22222

Mutex

af7a25d12a577183bc6b99084bac0e73

Attributes
  • reg_key

    af7a25d12a577183bc6b99084bac0e73

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c3a76b613083c05bb7db61c6b359870c2e90352076f2d32a9c96061494bab99.exe
    "C:\Users\Admin\AppData\Local\Temp\3c3a76b613083c05bb7db61c6b359870c2e90352076f2d32a9c96061494bab99.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Roaming\Microsoft.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft.exe" "Microsoft.exe" ENABLE
        3⤵
          PID:1172
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM Exsample.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft.exe

      Filesize

      37KB

      MD5

      da41705c070ddbe50b4774857de19a74

      SHA1

      8871c7ce68dde674da05339f3a6d6d0eefb0bcb0

      SHA256

      3c3a76b613083c05bb7db61c6b359870c2e90352076f2d32a9c96061494bab99

      SHA512

      c1de464d1f2a3fb5bc95fb615f8909e8889383112691f10263d1bdf1aee94228c527d09caa195f6f40fe92e76cff0fb7eb679420390269e412f72143b0a30e9b

    • C:\Users\Admin\AppData\Roaming\Microsoft.exe

      Filesize

      37KB

      MD5

      da41705c070ddbe50b4774857de19a74

      SHA1

      8871c7ce68dde674da05339f3a6d6d0eefb0bcb0

      SHA256

      3c3a76b613083c05bb7db61c6b359870c2e90352076f2d32a9c96061494bab99

      SHA512

      c1de464d1f2a3fb5bc95fb615f8909e8889383112691f10263d1bdf1aee94228c527d09caa195f6f40fe92e76cff0fb7eb679420390269e412f72143b0a30e9b

    • memory/612-131-0x0000000000000000-mapping.dmp

    • memory/612-134-0x0000000074DD0000-0x0000000075381000-memory.dmp

      Filesize

      5.7MB

    • memory/1172-135-0x0000000000000000-mapping.dmp

    • memory/2328-136-0x0000000000000000-mapping.dmp

    • memory/2428-130-0x0000000074DD0000-0x0000000075381000-memory.dmp

      Filesize

      5.7MB