Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 11:11

General

  • Target

    malware-analysis-writeups-master/bashar-bachir-chain/files/nod.ps1

  • Size

    420KB

  • MD5

    48edd7d80fd0b0846304f21436886345

  • SHA1

    b3ef389d9b405aa2a05921053dae69472294b600

  • SHA256

    f398f78aa8c9d3e515ecb829bd677c69abe4aac8352462bbadacff2b42d20117

  • SHA512

    06a8159b34b6bd45d08517bcc0a0ad15405c3116af587040419ec52624f1f8c9edf8e5380e76c4160e80ea81fadc9413ce0f3ba97bb2a6bfe95a7557c98ea28e

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Modifies Windows Firewall 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\malware-analysis-writeups-master\bashar-bachir-chain\files\nod.ps1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "{path}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE
        3⤵
          PID:4240

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1940-130-0x00000265D7CB0000-0x00000265D7CD2000-memory.dmp
      Filesize

      136KB

    • memory/1940-131-0x00007FFEACCE0000-0x00007FFEAD7A1000-memory.dmp
      Filesize

      10.8MB

    • memory/4240-135-0x0000000000000000-mapping.dmp
    • memory/4308-133-0x00000000004078C6-mapping.dmp
    • memory/4308-132-0x0000000000400000-0x000000000040C000-memory.dmp
      Filesize

      48KB

    • memory/4308-134-0x0000000074990000-0x0000000074F41000-memory.dmp
      Filesize

      5.7MB