Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:46
Behavioral task
behavioral1
Sample
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe
Resource
win7-20220414-en
General
-
Target
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe
-
Size
31KB
-
MD5
9e41cd107fb4c1b437246ef8b5fe64ec
-
SHA1
b5132e4c08c5c038b732a438862eb9c00f437f34
-
SHA256
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404
-
SHA512
cbb7066396db083179d8adfa668ba49882b8d6272dd6deb5f6b73b30e873b9083bdd2535a76a66edfdc36161526e48ff5e95afd0eb1980db0512c1165fc2748c
Malware Config
Extracted
njrat
0.7d
MyBot
192.168.157.1:80
a5f0657b4c860308399dc7b1f71c2ea3
-
reg_key
a5f0657b4c860308399dc7b1f71c2ea3
-
splitter
Y262SUCZ4UJJ
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xui.exepid process 4312 xui.exe -
Modifies Windows Firewall 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
xui.exedescription pid process Token: SeDebugPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe Token: 33 4312 xui.exe Token: SeIncBasePriorityPrivilege 4312 xui.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exexui.exedescription pid process target process PID 3848 wrote to memory of 4312 3848 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe xui.exe PID 3848 wrote to memory of 4312 3848 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe xui.exe PID 3848 wrote to memory of 4312 3848 8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe xui.exe PID 4312 wrote to memory of 1096 4312 xui.exe netsh.exe PID 4312 wrote to memory of 1096 4312 xui.exe netsh.exe PID 4312 wrote to memory of 1096 4312 xui.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe"C:\Users\Admin\AppData\Local\Temp\8f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xui.exe"C:\Users\Admin\AppData\Local\Temp\xui.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\xui.exe" "xui.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\xui.exeFilesize
31KB
MD59e41cd107fb4c1b437246ef8b5fe64ec
SHA1b5132e4c08c5c038b732a438862eb9c00f437f34
SHA2568f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404
SHA512cbb7066396db083179d8adfa668ba49882b8d6272dd6deb5f6b73b30e873b9083bdd2535a76a66edfdc36161526e48ff5e95afd0eb1980db0512c1165fc2748c
-
C:\Users\Admin\AppData\Local\Temp\xui.exeFilesize
31KB
MD59e41cd107fb4c1b437246ef8b5fe64ec
SHA1b5132e4c08c5c038b732a438862eb9c00f437f34
SHA2568f5f1f7e22a920eda275f0983d379985ba6b921112308daf60b15b1d0cb04404
SHA512cbb7066396db083179d8adfa668ba49882b8d6272dd6deb5f6b73b30e873b9083bdd2535a76a66edfdc36161526e48ff5e95afd0eb1980db0512c1165fc2748c
-
memory/1096-135-0x0000000000000000-mapping.dmp
-
memory/3848-130-0x0000000075460000-0x0000000075A11000-memory.dmpFilesize
5.7MB
-
memory/4312-131-0x0000000000000000-mapping.dmp
-
memory/4312-134-0x0000000075460000-0x0000000075A11000-memory.dmpFilesize
5.7MB