Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 16:16
Static task
static1
Behavioral task
behavioral1
Sample
9d46b723ec666db3e73ae900c474d660.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9d46b723ec666db3e73ae900c474d660.exe
Resource
win10v2004-20220414-en
General
-
Target
9d46b723ec666db3e73ae900c474d660.exe
-
Size
290KB
-
MD5
9d46b723ec666db3e73ae900c474d660
-
SHA1
a801d00b65f847806ea5c2496c62efae283b3a94
-
SHA256
80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba
-
SHA512
4d26098cac7368afb62c41b3c9a06870f6ae3d1fe4883ba9a4d5755d9a2e363b2d8cba55ec637ab24362a32a2c4c362d0192659a5abd62f87c2f0b0a9ed3c9cc
Malware Config
Extracted
njrat
im523
WormRATT
178.33.93.88:1742
7869d44e9b90d6b1e669bf52c9e89c61
-
reg_key
7869d44e9b90d6b1e669bf52c9e89c61
-
splitter
|'|'|
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
Server.exeinstall.exexuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeServer.exeinstall.exesvchost.exepid process 4636 Server.exe 2036 install.exe 4356 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe 4748 Server.exe 1276 install.exe 2352 svchost.exe -
Modifies Windows Firewall 1 TTPs
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Server.exe9d46b723ec666db3e73ae900c474d660.exeinstall.exexuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation Server.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 9d46b723ec666db3e73ae900c474d660.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation install.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe -
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7869d44e9b90d6b1e669bf52c9e89c61.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7869d44e9b90d6b1e669bf52c9e89c61.exe svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
install.exeinstall.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinDrvs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wininit.exe" install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinDrvs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wininit.exe" install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7869d44e9b90d6b1e669bf52c9e89c61 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7869d44e9b90d6b1e669bf52c9e89c61 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1144 2036 WerFault.exe install.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
install.exepid process 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe 1276 install.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 2352 svchost.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
install.exeinstall.exesvchost.exedescription pid process Token: SeDebugPrivilege 2036 install.exe Token: SeDebugPrivilege 1276 install.exe Token: SeDebugPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe Token: 33 2352 svchost.exe Token: SeIncBasePriorityPrivilege 2352 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
9d46b723ec666db3e73ae900c474d660.exeinstall.exexuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeServer.exesvchost.exedescription pid process target process PID 4836 wrote to memory of 4636 4836 9d46b723ec666db3e73ae900c474d660.exe Server.exe PID 4836 wrote to memory of 4636 4836 9d46b723ec666db3e73ae900c474d660.exe Server.exe PID 4836 wrote to memory of 4636 4836 9d46b723ec666db3e73ae900c474d660.exe Server.exe PID 4836 wrote to memory of 2036 4836 9d46b723ec666db3e73ae900c474d660.exe install.exe PID 4836 wrote to memory of 2036 4836 9d46b723ec666db3e73ae900c474d660.exe install.exe PID 4836 wrote to memory of 2036 4836 9d46b723ec666db3e73ae900c474d660.exe install.exe PID 2036 wrote to memory of 4356 2036 install.exe xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe PID 2036 wrote to memory of 4356 2036 install.exe xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe PID 2036 wrote to memory of 4356 2036 install.exe xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe PID 4356 wrote to memory of 4748 4356 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe Server.exe PID 4356 wrote to memory of 4748 4356 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe Server.exe PID 4356 wrote to memory of 4748 4356 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe Server.exe PID 4356 wrote to memory of 1276 4356 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe install.exe PID 4356 wrote to memory of 1276 4356 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe install.exe PID 4356 wrote to memory of 1276 4356 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe install.exe PID 4636 wrote to memory of 2352 4636 Server.exe svchost.exe PID 4636 wrote to memory of 2352 4636 Server.exe svchost.exe PID 4636 wrote to memory of 2352 4636 Server.exe svchost.exe PID 2352 wrote to memory of 2328 2352 svchost.exe netsh.exe PID 2352 wrote to memory of 2328 2352 svchost.exe netsh.exe PID 2352 wrote to memory of 2328 2352 svchost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d46b723ec666db3e73ae900c474d660.exe"C:\Users\Admin\AppData\Local\Temp\9d46b723ec666db3e73ae900c474d660.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE4⤵
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe"C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 21963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2036 -ip 20361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Server.exe.logFilesize
319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\install.exeFilesize
22KB
MD5f0fd76de624b9ba3c126c58a5911f891
SHA10461b5f1ca0aea15b7ce10b6cd85838d8b467a6a
SHA256a76025cb6fa555f77738a9887f6fcd5d3610678170a61bfbe611ee56537f986b
SHA5128b1b6b0a77778bc5dac1125930cfeadc21735ff3a92134e5bbc2f47196f80ab2a9777ad072925f785e76e8f4680ceb650254bbb5cd4e10d414982c2f22174b5b
-
C:\Users\Admin\AppData\Local\Temp\install.exeFilesize
22KB
MD5f0fd76de624b9ba3c126c58a5911f891
SHA10461b5f1ca0aea15b7ce10b6cd85838d8b467a6a
SHA256a76025cb6fa555f77738a9887f6fcd5d3610678170a61bfbe611ee56537f986b
SHA5128b1b6b0a77778bc5dac1125930cfeadc21735ff3a92134e5bbc2f47196f80ab2a9777ad072925f785e76e8f4680ceb650254bbb5cd4e10d414982c2f22174b5b
-
C:\Users\Admin\AppData\Local\Temp\install.exeFilesize
22KB
MD5f0fd76de624b9ba3c126c58a5911f891
SHA10461b5f1ca0aea15b7ce10b6cd85838d8b467a6a
SHA256a76025cb6fa555f77738a9887f6fcd5d3610678170a61bfbe611ee56537f986b
SHA5128b1b6b0a77778bc5dac1125930cfeadc21735ff3a92134e5bbc2f47196f80ab2a9777ad072925f785e76e8f4680ceb650254bbb5cd4e10d414982c2f22174b5b
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeFilesize
290KB
MD59d46b723ec666db3e73ae900c474d660
SHA1a801d00b65f847806ea5c2496c62efae283b3a94
SHA25680bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba
SHA5124d26098cac7368afb62c41b3c9a06870f6ae3d1fe4883ba9a4d5755d9a2e363b2d8cba55ec637ab24362a32a2c4c362d0192659a5abd62f87c2f0b0a9ed3c9cc
-
C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeFilesize
290KB
MD59d46b723ec666db3e73ae900c474d660
SHA1a801d00b65f847806ea5c2496c62efae283b3a94
SHA25680bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba
SHA5124d26098cac7368afb62c41b3c9a06870f6ae3d1fe4883ba9a4d5755d9a2e363b2d8cba55ec637ab24362a32a2c4c362d0192659a5abd62f87c2f0b0a9ed3c9cc
-
memory/1276-150-0x0000000005110000-0x000000000511A000-memory.dmpFilesize
40KB
-
memory/1276-148-0x0000000000000000-mapping.dmp
-
memory/2036-136-0x00000000001F0000-0x00000000001FC000-memory.dmpFilesize
48KB
-
memory/2036-140-0x0000000004D00000-0x0000000004D92000-memory.dmpFilesize
584KB
-
memory/2036-133-0x0000000000000000-mapping.dmp
-
memory/2036-139-0x0000000004C60000-0x0000000004CFC000-memory.dmpFilesize
624KB
-
memory/2036-144-0x0000000006230000-0x0000000006296000-memory.dmpFilesize
408KB
-
memory/2036-137-0x0000000005210000-0x00000000057B4000-memory.dmpFilesize
5.6MB
-
memory/2328-156-0x0000000000000000-mapping.dmp
-
memory/2352-154-0x0000000074270000-0x0000000074821000-memory.dmpFilesize
5.7MB
-
memory/2352-151-0x0000000000000000-mapping.dmp
-
memory/4356-141-0x0000000000000000-mapping.dmp
-
memory/4636-138-0x0000000074270000-0x0000000074821000-memory.dmpFilesize
5.7MB
-
memory/4636-130-0x0000000000000000-mapping.dmp
-
memory/4748-147-0x0000000074270000-0x0000000074821000-memory.dmpFilesize
5.7MB
-
memory/4748-145-0x0000000000000000-mapping.dmp