Analysis
-
max time kernel
150s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:40
Behavioral task
behavioral1
Sample
b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe
Resource
win7-20220414-en
General
-
Target
b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe
-
Size
43KB
-
MD5
3e89b7f7efb7198e47a7d9fc3a6dc566
-
SHA1
6e231218efac0fecceb9537a3377baf867bfe7c6
-
SHA256
b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78
-
SHA512
156c104b8cd3eb3a0c2045aa8be784aa227a7430e8523cd14897e0b3f4eb7bc4aa61c0daed7abda66219db078818ccdb35421ab83cbc4aee5e23cf84286bb93f
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
192.168.1.4:7777
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
BoostTrater.exeServer.exeServer.exepid process 1648 BoostTrater.exe 912 Server.exe 1752 Server.exe -
Loads dropped DLL 1 IoCs
Processes:
b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exepid process 1304 b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
BoostTrater.exepid process 1648 BoostTrater.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
BoostTrater.exedescription pid process Token: SeDebugPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe Token: 33 1648 BoostTrater.exe Token: SeIncBasePriorityPrivilege 1648 BoostTrater.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exeBoostTrater.exetaskeng.exedescription pid process target process PID 1304 wrote to memory of 1648 1304 b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe BoostTrater.exe PID 1304 wrote to memory of 1648 1304 b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe BoostTrater.exe PID 1304 wrote to memory of 1648 1304 b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe BoostTrater.exe PID 1304 wrote to memory of 1648 1304 b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe BoostTrater.exe PID 1648 wrote to memory of 1332 1648 BoostTrater.exe schtasks.exe PID 1648 wrote to memory of 1332 1648 BoostTrater.exe schtasks.exe PID 1648 wrote to memory of 1332 1648 BoostTrater.exe schtasks.exe PID 1648 wrote to memory of 1332 1648 BoostTrater.exe schtasks.exe PID 1184 wrote to memory of 912 1184 taskeng.exe Server.exe PID 1184 wrote to memory of 912 1184 taskeng.exe Server.exe PID 1184 wrote to memory of 912 1184 taskeng.exe Server.exe PID 1184 wrote to memory of 912 1184 taskeng.exe Server.exe PID 1184 wrote to memory of 1752 1184 taskeng.exe Server.exe PID 1184 wrote to memory of 1752 1184 taskeng.exe Server.exe PID 1184 wrote to memory of 1752 1184 taskeng.exe Server.exe PID 1184 wrote to memory of 1752 1184 taskeng.exe Server.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe"C:\Users\Admin\AppData\Local\Temp\b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BoostTrater.exe"C:\Users\Admin\AppData\Local\Temp\BoostTrater.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {048C0900-A1D7-424F-A396-87BFE90CD8F2} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\BoostTrater.exeFilesize
43KB
MD53e89b7f7efb7198e47a7d9fc3a6dc566
SHA16e231218efac0fecceb9537a3377baf867bfe7c6
SHA256b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78
SHA512156c104b8cd3eb3a0c2045aa8be784aa227a7430e8523cd14897e0b3f4eb7bc4aa61c0daed7abda66219db078818ccdb35421ab83cbc4aee5e23cf84286bb93f
-
C:\Users\Admin\AppData\Local\Temp\BoostTrater.exeFilesize
43KB
MD53e89b7f7efb7198e47a7d9fc3a6dc566
SHA16e231218efac0fecceb9537a3377baf867bfe7c6
SHA256b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78
SHA512156c104b8cd3eb3a0c2045aa8be784aa227a7430e8523cd14897e0b3f4eb7bc4aa61c0daed7abda66219db078818ccdb35421ab83cbc4aee5e23cf84286bb93f
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
43KB
MD53e89b7f7efb7198e47a7d9fc3a6dc566
SHA16e231218efac0fecceb9537a3377baf867bfe7c6
SHA256b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78
SHA512156c104b8cd3eb3a0c2045aa8be784aa227a7430e8523cd14897e0b3f4eb7bc4aa61c0daed7abda66219db078818ccdb35421ab83cbc4aee5e23cf84286bb93f
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
43KB
MD53e89b7f7efb7198e47a7d9fc3a6dc566
SHA16e231218efac0fecceb9537a3377baf867bfe7c6
SHA256b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78
SHA512156c104b8cd3eb3a0c2045aa8be784aa227a7430e8523cd14897e0b3f4eb7bc4aa61c0daed7abda66219db078818ccdb35421ab83cbc4aee5e23cf84286bb93f
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
43KB
MD53e89b7f7efb7198e47a7d9fc3a6dc566
SHA16e231218efac0fecceb9537a3377baf867bfe7c6
SHA256b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78
SHA512156c104b8cd3eb3a0c2045aa8be784aa227a7430e8523cd14897e0b3f4eb7bc4aa61c0daed7abda66219db078818ccdb35421ab83cbc4aee5e23cf84286bb93f
-
\Users\Admin\AppData\Local\Temp\BoostTrater.exeFilesize
43KB
MD53e89b7f7efb7198e47a7d9fc3a6dc566
SHA16e231218efac0fecceb9537a3377baf867bfe7c6
SHA256b3b6165383cd36c4384b63335c8405dbee8dd322815654ca40a9e446739a3d78
SHA512156c104b8cd3eb3a0c2045aa8be784aa227a7430e8523cd14897e0b3f4eb7bc4aa61c0daed7abda66219db078818ccdb35421ab83cbc4aee5e23cf84286bb93f
-
memory/912-66-0x0000000000DA0000-0x0000000000DB2000-memory.dmpFilesize
72KB
-
memory/912-64-0x0000000000000000-mapping.dmp
-
memory/1304-55-0x0000000076531000-0x0000000076533000-memory.dmpFilesize
8KB
-
memory/1304-54-0x00000000011A0000-0x00000000011B2000-memory.dmpFilesize
72KB
-
memory/1332-61-0x0000000000000000-mapping.dmp
-
memory/1648-57-0x0000000000000000-mapping.dmp
-
memory/1648-60-0x0000000001310000-0x0000000001322000-memory.dmpFilesize
72KB
-
memory/1752-67-0x0000000000000000-mapping.dmp