Analysis
-
max time kernel
156s -
max time network
156s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-05-2022 16:18
Static task
static1
Behavioral task
behavioral1
Sample
80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe
Resource
win10-20220414-en
General
-
Target
80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe
-
Size
290KB
-
MD5
9d46b723ec666db3e73ae900c474d660
-
SHA1
a801d00b65f847806ea5c2496c62efae283b3a94
-
SHA256
80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba
-
SHA512
4d26098cac7368afb62c41b3c9a06870f6ae3d1fe4883ba9a4d5755d9a2e363b2d8cba55ec637ab24362a32a2c4c362d0192659a5abd62f87c2f0b0a9ed3c9cc
Malware Config
Extracted
njrat
im523
WormRATT
178.33.93.88:1742
7869d44e9b90d6b1e669bf52c9e89c61
-
reg_key
7869d44e9b90d6b1e669bf52c9e89c61
-
splitter
|'|'|
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
Server.exeinstall.exexuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeServer.exeinstall.exesvchost.exepid process 1296 Server.exe 3112 install.exe 3352 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe 2024 Server.exe 2548 install.exe 2592 svchost.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7869d44e9b90d6b1e669bf52c9e89c61.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7869d44e9b90d6b1e669bf52c9e89c61.exe svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
install.exeinstall.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinDrvs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wininit.exe" install.exe Set value (str) \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinDrvs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wininit.exe" install.exe Set value (str) \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000\Software\Microsoft\Windows\CurrentVersion\Run\7869d44e9b90d6b1e669bf52c9e89c61 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7869d44e9b90d6b1e669bf52c9e89c61 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2052 3112 WerFault.exe install.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
install.exepid process 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe 2548 install.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 2592 svchost.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
install.exeinstall.exesvchost.exedescription pid process Token: SeDebugPrivilege 3112 install.exe Token: SeDebugPrivilege 2548 install.exe Token: SeDebugPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe Token: 33 2592 svchost.exe Token: SeIncBasePriorityPrivilege 2592 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exeinstall.exexuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeServer.exesvchost.exedescription pid process target process PID 2272 wrote to memory of 1296 2272 80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe Server.exe PID 2272 wrote to memory of 1296 2272 80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe Server.exe PID 2272 wrote to memory of 1296 2272 80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe Server.exe PID 2272 wrote to memory of 3112 2272 80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe install.exe PID 2272 wrote to memory of 3112 2272 80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe install.exe PID 2272 wrote to memory of 3112 2272 80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe install.exe PID 3112 wrote to memory of 3352 3112 install.exe xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe PID 3112 wrote to memory of 3352 3112 install.exe xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe PID 3112 wrote to memory of 3352 3112 install.exe xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe PID 3352 wrote to memory of 2024 3352 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe Server.exe PID 3352 wrote to memory of 2024 3352 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe Server.exe PID 3352 wrote to memory of 2024 3352 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe Server.exe PID 3352 wrote to memory of 2548 3352 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe install.exe PID 3352 wrote to memory of 2548 3352 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe install.exe PID 3352 wrote to memory of 2548 3352 xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe install.exe PID 1296 wrote to memory of 2592 1296 Server.exe svchost.exe PID 1296 wrote to memory of 2592 1296 Server.exe svchost.exe PID 1296 wrote to memory of 2592 1296 Server.exe svchost.exe PID 2592 wrote to memory of 1628 2592 svchost.exe netsh.exe PID 2592 wrote to memory of 1628 2592 svchost.exe netsh.exe PID 2592 wrote to memory of 1628 2592 svchost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe"C:\Users\Admin\AppData\Local\Temp\80bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE4⤵
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe"C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 18603⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Server.exe.logFilesize
319B
MD56b5a2c06d34c86bcc8aacc3a739fd362
SHA154fc90eaa12ba9251414e8dac83fdae08819ee42
SHA2561492fc3847a36be51e64ca15fb12b6cc177891495f6409cfe678d88cb2f59b68
SHA512228099efd50e8017eb9e320459bba6c4d40af8c92c1761b58ce35424f7f1bc1c3d4f4d808515ed27570f0e50bdf8945a9f8264806f92c30d2a70a9aa85c444ba
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\install.exeFilesize
22KB
MD5f0fd76de624b9ba3c126c58a5911f891
SHA10461b5f1ca0aea15b7ce10b6cd85838d8b467a6a
SHA256a76025cb6fa555f77738a9887f6fcd5d3610678170a61bfbe611ee56537f986b
SHA5128b1b6b0a77778bc5dac1125930cfeadc21735ff3a92134e5bbc2f47196f80ab2a9777ad072925f785e76e8f4680ceb650254bbb5cd4e10d414982c2f22174b5b
-
C:\Users\Admin\AppData\Local\Temp\install.exeFilesize
22KB
MD5f0fd76de624b9ba3c126c58a5911f891
SHA10461b5f1ca0aea15b7ce10b6cd85838d8b467a6a
SHA256a76025cb6fa555f77738a9887f6fcd5d3610678170a61bfbe611ee56537f986b
SHA5128b1b6b0a77778bc5dac1125930cfeadc21735ff3a92134e5bbc2f47196f80ab2a9777ad072925f785e76e8f4680ceb650254bbb5cd4e10d414982c2f22174b5b
-
C:\Users\Admin\AppData\Local\Temp\install.exeFilesize
22KB
MD5f0fd76de624b9ba3c126c58a5911f891
SHA10461b5f1ca0aea15b7ce10b6cd85838d8b467a6a
SHA256a76025cb6fa555f77738a9887f6fcd5d3610678170a61bfbe611ee56537f986b
SHA5128b1b6b0a77778bc5dac1125930cfeadc21735ff3a92134e5bbc2f47196f80ab2a9777ad072925f785e76e8f4680ceb650254bbb5cd4e10d414982c2f22174b5b
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
37KB
MD505d1abc69e538eb3c86bfeacc33c2a10
SHA1f424222562968f86d5d043cce57b1a0389061150
SHA256cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918
SHA512e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526
-
C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeFilesize
290KB
MD59d46b723ec666db3e73ae900c474d660
SHA1a801d00b65f847806ea5c2496c62efae283b3a94
SHA25680bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba
SHA5124d26098cac7368afb62c41b3c9a06870f6ae3d1fe4883ba9a4d5755d9a2e363b2d8cba55ec637ab24362a32a2c4c362d0192659a5abd62f87c2f0b0a9ed3c9cc
-
C:\Users\Admin\AppData\Local\Temp\xuSnMEBMdrNBKicGIoJOWMrBBzEbipUggwzDuTib.exeFilesize
290KB
MD59d46b723ec666db3e73ae900c474d660
SHA1a801d00b65f847806ea5c2496c62efae283b3a94
SHA25680bb4f3c9e2ea5ea1ca55ffa2a5fd303058c240133d32b93e7c89a96712a5cba
SHA5124d26098cac7368afb62c41b3c9a06870f6ae3d1fe4883ba9a4d5755d9a2e363b2d8cba55ec637ab24362a32a2c4c362d0192659a5abd62f87c2f0b0a9ed3c9cc
-
memory/1296-127-0x0000000073340000-0x00000000738F0000-memory.dmpFilesize
5.7MB
-
memory/1296-118-0x0000000000000000-mapping.dmp
-
memory/1628-146-0x0000000000000000-mapping.dmp
-
memory/2024-134-0x0000000000000000-mapping.dmp
-
memory/2024-139-0x0000000073340000-0x00000000738F0000-memory.dmpFilesize
5.7MB
-
memory/2548-136-0x0000000000000000-mapping.dmp
-
memory/2548-138-0x0000000005890000-0x0000000005922000-memory.dmpFilesize
584KB
-
memory/2548-140-0x0000000003190000-0x000000000319A000-memory.dmpFilesize
40KB
-
memory/2592-141-0x0000000000000000-mapping.dmp
-
memory/2592-144-0x0000000073340000-0x00000000738F0000-memory.dmpFilesize
5.7MB
-
memory/3112-124-0x0000000000440000-0x000000000044C000-memory.dmpFilesize
48KB
-
memory/3112-132-0x00000000062D0000-0x0000000006336000-memory.dmpFilesize
408KB
-
memory/3112-126-0x0000000004E40000-0x0000000004EDC000-memory.dmpFilesize
624KB
-
memory/3112-125-0x00000000052A0000-0x000000000579E000-memory.dmpFilesize
5.0MB
-
memory/3112-121-0x0000000000000000-mapping.dmp
-
memory/3352-128-0x0000000000000000-mapping.dmp