Analysis
-
max time kernel
170s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:46
Behavioral task
behavioral1
Sample
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe
Resource
win7-20220414-en
General
-
Target
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe
-
Size
31KB
-
MD5
9e41cd107fb4c1b437246ef8b5fe64ec
-
SHA1
b5132e4c08c5c038b732a438862eb9c00f437f34
-
SHA256
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404
-
SHA512
cbb7066396db083179d8adfa668ba49882b8d6272dd6deb5f6b73b30e873b9083bdd2535a76a66edfdc36161526e48ff5e95afd0eb1980db0512c1165fc2748c
Malware Config
Extracted
njrat
0.7d
MyBot
192.168.157.1:80
a5f0657b4c860308399dc7b1f71c2ea3
-
reg_key
a5f0657b4c860308399dc7b1f71c2ea3
-
splitter
Y262SUCZ4UJJ
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xui.exepid process 1720 xui.exe -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exepid process 952 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
xui.exedescription pid process Token: SeDebugPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe Token: 33 1720 xui.exe Token: SeIncBasePriorityPrivilege 1720 xui.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exexui.exedescription pid process target process PID 952 wrote to memory of 1720 952 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe xui.exe PID 952 wrote to memory of 1720 952 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe xui.exe PID 952 wrote to memory of 1720 952 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe xui.exe PID 952 wrote to memory of 1720 952 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe xui.exe PID 1720 wrote to memory of 1848 1720 xui.exe netsh.exe PID 1720 wrote to memory of 1848 1720 xui.exe netsh.exe PID 1720 wrote to memory of 1848 1720 xui.exe netsh.exe PID 1720 wrote to memory of 1848 1720 xui.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe"C:\Users\Admin\AppData\Local\Temp\8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xui.exe"C:\Users\Admin\AppData\Local\Temp\xui.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\xui.exe" "xui.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\xui.exeFilesize
31KB
MD59e41cd107fb4c1b437246ef8b5fe64ec
SHA1b5132e4c08c5c038b732a438862eb9c00f437f34
SHA2568f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404
SHA512cbb7066396db083179d8adfa668ba49882b8d6272dd6deb5f6b73b30e873b9083bdd2535a76a66edfdc36161526e48ff5e95afd0eb1980db0512c1165fc2748c
-
C:\Users\Admin\AppData\Local\Temp\xui.exeFilesize
31KB
MD59e41cd107fb4c1b437246ef8b5fe64ec
SHA1b5132e4c08c5c038b732a438862eb9c00f437f34
SHA2568f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404
SHA512cbb7066396db083179d8adfa668ba49882b8d6272dd6deb5f6b73b30e873b9083bdd2535a76a66edfdc36161526e48ff5e95afd0eb1980db0512c1165fc2748c
-
\Users\Admin\AppData\Local\Temp\xui.exeFilesize
31KB
MD59e41cd107fb4c1b437246ef8b5fe64ec
SHA1b5132e4c08c5c038b732a438862eb9c00f437f34
SHA2568f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404
SHA512cbb7066396db083179d8adfa668ba49882b8d6272dd6deb5f6b73b30e873b9083bdd2535a76a66edfdc36161526e48ff5e95afd0eb1980db0512c1165fc2748c
-
memory/952-54-0x0000000075941000-0x0000000075943000-memory.dmpFilesize
8KB
-
memory/952-55-0x00000000745C0000-0x0000000074B6B000-memory.dmpFilesize
5.7MB
-
memory/1720-57-0x0000000000000000-mapping.dmp
-
memory/1720-61-0x00000000745C0000-0x0000000074B6B000-memory.dmpFilesize
5.7MB
-
memory/1848-62-0x0000000000000000-mapping.dmp